1TLSisthesuccessorofSSLbutbothusethesameX509certicatesThroughoutthepaperwerefertoSSLclientsandSSLcerticatesbutourndingsapplyequallytoserversusingbothprotocols serversthatweresusceptibleto ID: 608424
Download Pdf The PPT/PDF document "AnalysisofSSLCerticateReissuesandRevoca..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
AnalysisofSSLCerticateReissuesandRevocationsintheWakeofHeartbleedLiangZhangDavidChoffnesDaveLevinTudorDumitra¸sNortheasternUniversityNortheasternUniversityUniversityofMarylandUniversityofMarylandliang@ccs.neu.educhoffnes@ccs.neu.edudml@cs.umd.edutdumitra@umiacs.umd.eduAlanMisloveAaronSchulmanChristoWilsonNortheasternUniversityStanfordUniversityNortheasternUniversityamislove@ccs.neu.eduaschulm@stanford.educbw@ccs.neu.edu 1TLSisthesuccessorofSSL,butbothusethesameX.509certicates.Throughoutthepaper,wereferto\SSLclients"and\SSLcerticates,"butourndingsapplyequallytoserversusingbothprotocols. serversthatweresusceptibletoHeartbleedshouldhaveop-eratedundertheassumptionthananattackerhadalreadyobtainedtheirprivatekeys,andthereforeshouldhavere-vokedtheircerticatesandreissuednewones[5],ideallyassoonasthevulnerabilitywaspubliclyannounced.Thescopeofthisvulnerability|itisestimatedthatupto17%ofallHTTPSwebserverswerevulnerable[22]|makesitanidealcasestudyforevaluatinglarge-scalepropertiesofSSLsecurityinthefaceofprivatekeycompromise.Whilepreviousstudieshavemeasuredhowquicklyandthoroughlyadministratorspatchsoftwarevulnerabilities[25,27,35],weare,tothebestofourknowledge,thersttostudyadmin-istrationofcerticatesinthewakeofavulnerability.Inparticular,thispaperfocusesoncerticaterevocationandreissuesinresponsetothepublicannouncementofHeart-bleed,bothintermsofhowquicklycerticatesarereissuedandwhetherornotthecerticatesareeventuallyrevoked.Towardthisgoal,wemakethefollowingkeycontributions.First,weconductalarge-scalemeasurementstudyofSSLcerticatesinthewildusingbothdatacollectedfrompublicarchivesandthroughcustommeasurementsconductedaf-terHeartbleedwaspublicized.WefocusontheAlexaTop1Million(Top-1M)domains,forwhichwendatotalof628,692validSSLcerticatesfrom166,124uniquedomains.Second,weconductmeasurementstodeterminewhichserversremainvulnerabletoHeartbleedandwhichoneswerepreviouslyvulnerablebutarenowpatched.Wede-velopanewSSLimplementationngerprintingtechniquethatisabletodetermineifahostisrunningaversionofOpenSSLthatwasvulnerableinthepast.Wecross-validatewithdirectmeasurementsofthevulnerability(wendourtechniquehasafalsepositiverateofonly1.9%)andcon-ductscanstocomposealistofpreviouslyvulnerablehosts.WendthatthemostpopularwebsitesweremorelikelytohaveatleastonehostvulnerabletoHeartbleed,likelybecausetheyoftenhavemorehosts.Third,wedevelopnovelheuristicstoidentifywhichcer-ticateshavebeenreissuedindirectresponsetoHeartbleed,asopposedtootherreasonssuchascerticateexpirationorperiodicreissues.Thisallowsustounderstandhowad-ministratorsdo(ordonot)reacttopotentialprivatekeycompromise.WeobservethatwhilevulnerablesiteswithahigherAlexarankweremorelikelytoreissuetheircer-ticates,thevastmajority(73.3%)ofvulnerablecerticateshadnotbeenreissuedfullythreeweeksafterthevulnerabil-itywasannounced.Thesevulnerablecerticatescomefrommorethan55,000uniquedomains.Fourth,weanalyzecerticaterevocationbehaviorovertimeandacrosscerticateowners.Wendasharp(upto40-fold)increaseinrevocationsperdayaftertheHeart-bleedannouncement,butforthemajority(60%)ofreissuedcerticates,theprevious(vulnerable)certicatewasnotre-voked.ForthosethatarerevokedduetoHeartbleed,wendmorerevocationsincerticaterevocationlists(CRLs)tohaveexplanations(reasoncodes)thanrevocationsun-relatedtoHeartbleed,andtheyappearintheCRLsmorequicklythanrevocationsnotduetoHeartbleed.Further,weexaminetheupdatefrequencyofCRLstodetermineifCerticateAuthorities(CAs),theentitiesthatissuecerti-cates,serveasa\bottleneck"forrevocations(asitistheCAwhomaintainstheCRL).WendthatCRLsappeartobeupdatedfrequently,withover95%ofthembeingupdatedwithintheprevious24-hourperiod.Theremainderofthispaperisorganizedasfollows.Inthenextsection,weprovidebackgroundaboutSSL/TLS,PKIs,andtheHeartbleedvulnerability.Inx3wedescribeourdatasetandmethodologyforextractingvalidcerti-catesanddeterminingHeartbleedvulnerabilityatservers.x4presentstheresultsofouranalysis,whereweidentifythebehaviorofcerticatereissuingandrevocationonalargedatasetofAlexa'sTop-1Mwebsites.Wesummarizerelatedworkinx5andconcludeinx6.2.BACKGROUNDSecureSocketsLayer(SSL)andTransportLayerSecurity(TLS)oerapplication-layercondentialityandintegrity,andarethebasisofthevastmajorityofsecureonlinecom-munication.Throughtheuseofapublickeyinfrastructure(PKI),theseprotocolsalsoallowclientstoauthenticatetheserverswithwhomtheycommunicate.Inthissection,weprovideabriefbackgroundofSSL/TLSandPKIsrelevanttoourstudy,anddescribetherecentHeartbleedvulnerability.2.1CerticatesAcerticateis,atitscore,asignedattestationbindingasubjecttoapublickey.CerticatesaresignedbyaCer-ticateAuthority(CA),whointurnhasitsowncerticate,andsoon,terminatingatself-signedrootcerticates.Thereisalogicalchainofcerticates|leadingfromarootcerti-catethroughzeroormoreintermediatecerticates,toaleafcerticate|whereinthecerticateatleveliissignedwiththeprivatekeycorrespondingtothecerticateatleveli1,withtheexceptionoftheself-signedcerticateattheroot.Inpractice,thetopologyofcerticatescanbesomewhatcomplex,withCAssigningoneanother'scerticates[17],butsuchdetailsarenotpertinenttothestudyperformedinthispaper.Whenaclientvisitsasitethatsupports,say,HTTPS,thatsitesendsitscerticatechaintotheclient,whoveriesthesignaturesfromleaftoroot.Iftheclientcansuccess-fullyvalidateeachsignature,andiftheclienttruststherootcerticate|forinstancebycheckingitagainstasetofcerti-catespre-installedinthebrowseroroperatingsystem|thentheclientinfersthatthesubjectintheleafcerticatetrulyistheownerofthepublickey.ThepredominantformatofcerticatesisX.509[6],whichincludesconsiderablymoreinformationthanjustsubjectandpublickey,includingaunique(forthatCA)serialnum-ber,anexpirationdate,thekey'sciphersuite,acceptableusesofthekey,andinformationonhowtocheckwhetherthecerticatehasbeenrevoked.2.2CerticateRevocationInadditiontoissuingcerticates,CAsarealsoresponsi-bleformakingavailablealistofcerticatesithasissuedthathavebeenrevoked,afterwhichclientsshouldnolongerconsiderthosecerticatesvalid.Notethat,ifaCA's(in-termediateorroot)certicateisrevoked,allleafcerticatessignedbythatCAwillfailtovalidate.Therearemanyreasonsasitecandecidetorevokeacer-ticate.Onecriticallyimportantexampleisthatofacom-promisedcerticate.Acerticateiscompromisedifsomeoneotherthanitsoriginalownerlearnsthecorrespondingpri-vatekey,allowingthatpersontogeneratesignaturesandthusimpersonatetheowner.InthecaseofaCAcerticate,releaseoftheprivatekeymayallowanattackertogenerate newcerticatesforarbitrarysubjects.Insuchanevent,itisimportantthattheownerrevokesthecompromisedcer-ticateasquicklyaspossibletomitigatethesetofusersaectedbythecompromise.CerticateRevocationLists(CRLs)arebyfarthemostcommonmeansofdisseminatingrevocations.CRLsconsistofalistof(serialnumber,timestampofrevocation,reasonforrevocation)triples,allofwhicharecollectivelysignedbytheCA.CAsincludeinthecerticatesthattheyissueaURLpointingtotheCRLthatwouldcontainthatcerti-cate'sserialnumber,ifitweretobecomerevoked.ClientsperiodicallydownloadandcacheCRLs,andusethemwhenvalidatingacerticatechain.Ostensiblytoreducethecom-municationoverheadforCAsandforusers,clientstypi-callydownloadCRLsinfrequently(ontheorderofhoursordays),potentiallyleavingmanyuserswithoutdatedin-formationonthevalidityoftheircerticates.Thishasspurredseveralstudiesintomoreecientmeansofrevo-cation[12,21,23,29,36],andgeneraldoubtastotheover-allecacyofrevocations[28].Yet,CRLsremainthedefactomeansofdisseminatingrevocationinformation,andthustheyfactorheavilyinourstudy.2.3CerticateReissuesWhenasiteceasestouseacerticate|forinstancebe-causetheyfoundthatthecerticatehasbeencompromised,orbecausethecerticateexpired|theymustuseanewcer-ticateinstead.Thisprocessisreferredtoasreissuingthecerticate.Todoso,thesystemadministratormustcon-tacttheCAwhosignedtheircerticateandrequestanewsignature;thisistypicallydonebysendingtheCAaCerti-cateSigningRequest(CSR).Inthecasewheretheprivatekeymayhavebeencompromised,theadministratorshouldalsochooseanewpublic/privatekeypairtobesigned(asreissuingthecerticatewiththesamekeydoesnothingtomitigatetheleakedprivatekey).Whileitseemsnaturaltoassumethatcerticatesarereis-suedatpreciselythemomenttheoldcerticateisrevoked,infacttoday'sPKIprotocolsmakenosuchrequirement.Asourstudywilldemonstrate,reissuescanhappenbefore,dur-ing,orafterarevocation|orevenwithoutrevokingtheoldcerticateatall.Tothebestofourknowledge,wearethersttocorrelaterevocationswithreissues.2.4HeartbleedHeartbleedisabuerover-readvulnerabilitydiscoveredinOpenSSL[24]thatwaspresentinversions1.0.1(releasedMarch14,2012)through1.0.1f.ThevulnerabilitystemsfromabuginOpenSSL'simplementationoftheTLSHeart-beatExtension[30].TheintendedfunctionalityofTLSHeartbeatistoallowaclienttotestasecurecommuni-cationchannelbysendinga\heartbeat"messageconsistingofastringandthe16-bitpayload_lengthofthisstring.Unfortunately,vulnerableOpenSSLversionsfailtocheckthatthepayload_lengthsuppliedbytheclientmatchesthelengthoftheprovidedstring.Thisallowsamaliciousclienttocraftaheartbeatmessagecontaininga1-bytestringand2161asthepayload_length.Inthiscase,OpenSSLwillallocatea64KBblockofheapmemory,memcpy()64KBofdataintoit,startingwiththe1-bytestring,andnallysendthecontentsoftheentirebuertotheclient.Ineect,thisallowsthemaliciousclienttoreadupto2162bytesoftheserver'sheapmemory.Notethatwhilethemaliciousclientcanchoosetheamountofmemorytoread,ithasnocontroloverthelocationofthememorythatiscopied,andthereforecannotchoosewhichmemorytoread.ByrepeatedlyexploitingHeartbleed,anattackercanextractsensitivedatafromtheserver(e.g.,SSLprivatekeys[32],userdata[13],etc.).TheseverityofHeartbleedisexacerbatedbythefactthatOpenSSLdoesnotlogheart-beatmessages,givingattackersfreereigntoundetectablyexploitHeartbleed.Giventheseverityandundetectablena-tureofmalicioususersexploitingHeartbleed,siteoperatorswereurgedtoimmediatelyupdatetheirOpenSSLsoftwareandrevokeandreissuetheircerticates[5].Timeline.HeartbleedwasrstdiscoveredbyNeelMehtafromGoogleonMarch21,2014.GoogleimmediatelywroteapatchandappliedittotheirownOpenSSLdeployments.OnApril2,researchersatFinnishsecuritycompanyCode-nomiconindependentlydiscoveredthebuganddubbeditHeartbleed.OnApril4,Akamaipatchedtheirservers.OnApril7,thebugbecamepublicandtheOpenSSLprojectre-leasedapatchedversion(1.0.1g)oftheOpenSSLlibrary[15].WhystudyHeartbleed?Thesignicanceofthistime-line,andofHeartbleedingeneral,isthatitrepresentsapointintimeafterwhichallvulnerableserversshouldhavetakenthreecriticalstepstoensurethesecurityoftheirser-viceandtheirusers:theyshouldhavepatchedtheircode,revokedtheiroldcerticate,andreissuedanewone.Asaresult,Heartbleedactsasasortofnaturalexperiment,al-lowingustomeasurehowcompletelyandquicklyadminis-tratorstookstepstosecuretheirkeys.Whilesucheventsare(sadly)notterriblyuncommonforgeneralsecurityvulnera-bilities[25,27,35],itremainsrarethatsuchalargefractionofthecerticateecosystemmustreissueandrevoketheirSSLcerticates.3.DATAANDMETHODOLOGYWenowdescribethedatasetsthatwecollectedandourmethodologyfordeterminingahost'sSSLcerticate,whenitwasinuse,ifandwhenthecerticatewasrevoked,andifthehostwas(orisstill)vulnerabletotheHeartbleedbug.3.1CerticateDataSourceWeobtainourcollectionofSSLcerticatesfrom(roughly)weeklyscansoftheentireIPv4addressspacemadeavailablebyRapid7[26].Inthispaper,weusescanscollectedbetweenOctober30,2013andApril28,2014.Thereareatotalof28scansduringthisperiod,givinganaverageof6.7days(withaminimumof3daysandmaximumof9days)betweensuccessivescans.Thescandataincludesallcerticatesadvertisedbyeachhost(includingintermediateandrootcerticates)inthescansupthroughFebruary5,2014,andincludesonlytherstadvertisedcerticatebyeachhostinthelaterscans.Forexample,supposethatahostisadvertisingachainofthreecerticates:acerticateforexample.com,acerticateforGeoTrust,andself-signedrootcerticate,whereeachcerticatesignstheprevious.Theearlierscanswouldin-cludeallthreecerticates,whereasthelaterscanswouldincludeonlythecerticateforexample.com.Thelackoffullcerticatechainsinthelaterscanspresentschallengesforvalidation,whichweaddressinx3.2. Figure1:Work owfromrawscansoftheIPv4addressspacetovalidcerticates(andcorrespondingCRLs)fromtheAlexaTop-1Mdomains.TheRapid7dataafterFebruary5,2014didnotincludetheintermediate(CA)certicates,necessitatingadditionalstepsanddatatoperformvalidation.Thescansfoundanaverageof26.9millionhostsrespond-ingtoSSLhandshakesonport443(anaverageof9.12%oftheentireIPv4addressspace).Acrossallofthescans,weobservedatotalof19,438,865uniquecerticates(in-cludingallleafandCAcerticates).Inthesectionsbelow,wedescribehowwelteredandvalidatedthisdataset;anoverviewoftheprocessisprovidedinFigure1.3.2FilteringDataTofocusonwebdestinationsthatarecommonlyaccessedbyusers,weusetheAlexaTop-1Mdomains[2]asobservedonApril28,2014.Werstextractallleaf(non-CA)cer-ticatesthatadvertiseaCommonName(CN)thatisinoneofthedomainsintheAlexalist(e.g.,wewouldincludecerticatesforfacebook.com,www.facebook.com,aswellas*.dev.facebook.com).Thissetrepresents1,573,332certi-cates(8.1%ofallcerticates).Inordertoremoveinvalidandself-signedcerticatesfromthislist,wethenextractalladvertisedchainsforthesecerticates(whichareonlypresentinthescansthroughFebruary5,2014).Reconstructingchains.Thelackoffullcerticatechainsforthepost-February5,2014scans(seex3.1)presentsachallengeatthispoint,asweneedthefullcerticatechainsinordertoproperlyvalidatetheleafcerticates.Toverifynewcerticatesobservedintheselaterscans,weconstructalistofall4,509intermediate(CA),non-self-signedcerti-catesobservedinpreviousscans.2Fromthesecerticates,weusetwotypesofX.509eldstohelpwithchainrecon-struction[6]:TheSubjectKeyIdentierandAuthorityKeyIden-tieraretwoeldsincludedinmostcerticates,anduniquelyidentifythepublickeythecerticaterepre-sents(SubjectKeyIdentier)andthepublickeythatsignedthiscerticate(AuthorityKeyIdentier).Thevalueistypicallyimplementedasahashofthepublickey.TheSubjectNameandIssuerNamearetexteldsthatrepresentthenameoftheentitythiscerticaterep- 2Wealsoconductourowncrawl(seex3.4)ofhostsadvertis-ingcerticatesintheAlexalist,andincludedall4,445ad-ditionalnon-self-signedCAcerticatesthatwediscoveredinthislistaswell.However,wefoundthatnoneoftheadditionalCAcerticateswerenecessaryforvalidation.resents(SubjectName)andthenameofentitythatsignedthiscerticate(IssuerName).Weconstructadatabaseofallfouroftheseeldsacrossall8,954CAcerticates.Usingthisdatabase,weattempttoreconstructaleafcer-ticate'schainbasedrstonthecerticate'sAuthorityKeyIDand,failingthat,thecerticate'sIssuerName.Inotherwords,givenaleafcerticate,welookforaCAcerticatewhoseSubjectKeyIdentieristhesameasourleaf'sAu-thorityKeyIdentier.Shouldwenotndone(orshouldtheSubjectKeyIdentiernotbepresent),weinsteadlookforaCAcerticatewhoseSubjectNameisthesameasourleaf'sIssuerName.Wethenrecursivelyapplythistechniqueuntilwecannotndaparentkey,wehitatrustedrootcerticate,orwehitaself-signedCAcerticate.Shouldwendmul-tipleCAkeysthatmatchatanystage,weincludethemallaspotentialchains.Verifyingchains.Wethenunifyoursetofpotentialchains,consistingofbothhost-advertisedchains(forthedatacollectedthroughFebruary5,2014)andreconstructed-chains(forthedatacollectedpost-February5,2014).Un-fortunately,despitetheleafcerticatehavingaCommonNameintheAlexalist,manyofourchainsmaynotbevalid(e.g.,expiredcerticates,forgedself-signedcerticates,certicatessignedbyaninvalidroot,etc.).Onecommonsourceofinvalidcerticatesishomerouters/DSLmodemsprovidedbyISPs(e.g.,FRITZ!Boxes)orcloud-accessiblestoragedevices(e.g.,WesternDigital'sMyCloud),bothofwhichadvertiseself-signedSSLcerticatesinthefritz.netandwd2go.comdomains.Weremovedtheseinvalidchainsbyrunningopensslver-ifyoneachcerticate(anditscorrespondingchain),andonlykeptthecerticatesthatOpenSSLcouldverify.Be-causethescansoccurredatdierentpointsoftime,weusedthefaketimelibrary[14]tohaveOpenSSLvalidatethecerticateasofthetimeofthescan.WealsocongureOpenSSLtotrustthesetofrootCAcerticatesincludedbydefaultintheOSX10.9.2rootstore[20];thisincludes222uniquerootcerticates.Aftervalidation,weareleftwith628,692leafcerticates(40.0%ofallcerticatesadvertisingAlexadomainsand3.2%ofallcerticates)fromAlexaTop-1MdomainsthatwereadvertisedbysomeIPaddressandcouldbevalidated;werefertothissetofcerticatesastheLeafSet.Eachofthese 2014-02-059,640,973 leaf certificates4,313,480 CA certificates3,240,205 leaf certificatesRapid7Input DataTop-1M domains1,212,837 leaf certificates360,495 leaf certificates FilteringValid chains477,557 leaf certificates 151,135 leaf certificates CA certificates 628,692 leaf certificatesCA certificatesFinal certificates 2014-02-102014-04-28 45,268 revoked leaf certificates 7 revoked CA certificates 1,386 unique Revoked certs as of2014-05-06 Figure2:Fractionofnewcerticatesthatwecouldver-ifyforprovided(February5,2014andbefore)andrecon-structed(postFebruary5,2014)chains.certicateshasavalidchain;werefertothecollectionofallCAcerticatesonthesechains(notincludingtheleafcerticates)astheCASet;theCASetcontains910uniquecerticates.TheLeafSetcerticatescover166,124(16.6%)oftheAlexaTop-1Mdomains.Thisisthesetofcerticates(andcerticatechains)thatweuseintheremainderofthepaper.Validationofreconstruction.Finally,webrie yvalidateourcerticatechainreconstructionmechanismonthepost-February5,2014certicates.InFigure2,wepresentthefractionofnewcerticatesdiscoveredovertimeforwhichwewereabletondavalidchain,bothforthepre-andpost-February5,2014data.Wemaketwointerestingobserva-tions:First,thefractionofcerticatesthatwecouldvalidateisrelativelystableat2%bothbeforeandaftertheswitchtousingreconstructedchains,suggestingthatourmechanismforchainreconstructiondoesnotmissmanychains.Sec-ond,weseealargeuptickinthefractionofnewly-appearingcerticatesthatwecouldvalidateafterHeartbleed;aswediscussinthefollowingsection,thisisduetomanycerti-catesbeingreissuedinthewakeofHeartbleed.3.3CollectingCRLsTodetermineifandwhencerticateswererevoked,weextractedtheCRLURLsoutofallLeafSetcerticates.WeignoredinvalidURLs,includingldap://protocolsandnon-routableaddresses.Wefound626,659(99.7%)ofthesecer-ticatestoincludeatleastonewell-formed,reachableCRLURL;forcerticatesthatincludedmultipleCRLURLs,weincludedthemall.Wefoundatotalof1,386uniqueCRLURLs(mostcerticatesuseauniedCRLprovidedbythesigningCA,sothesmallnumberofCRLsisnotsurprising).WedownloadedalloftheseCRLsonMay6,2014,andfound45,268(7.2%)oftheLeafSetcerticatestoberevoked.WealsocollectedtheCRLURLsforallcerticatesintheCAset.Wefoundthat884(97.1%)ofthecerticatesintheCASetincludedareachableCRL;theunionoftheseURLscomprised246uniquereachableURLs.Wedown-loadedtheseCRLsonMay6,2014,aswell.WefoundatotalofsevenCAcerticatesthatwererevoked,whichnul-liedthevalidityof60certicatesintheLeafSet(0:01%).3.4InferringHeartbleedVulnerabilityFinally,wewishtodetermineifasitewasevervulnerabletotheHeartbleedOpenSSLvulnerability(andifitcontinuedtobevulnerableattheendofthestudy).Doingsoallowsustoreasonaboutwhetherthesiteoperatorsshouldhave Figure3:FlowchartofinferenceofpreviousHeartbleedvulnerabilityofhostsbasedonourSSLscan.reissuedtheirSSLcerticate(s)andrevokedtheiroldone(s).DeterminingifahostiscurrentlyvulnerabletoHeartbleedisrelativelyeasy,asonecansimplysendimproperly-formattedSSLheartbeatmessagestotestforvulnerability.However,determiningifasitewasvulnerableatsomepointinthepast|buthassinceupdatedtheirOpenSSLcode|ismorechallenging.WeobservethatonlythreeofthecommonTLSimplementationshaveeversupportedSSLHeartbeats[30]:OpenSSL[24],GnuTLS[33],andBotan[4].Thus,ifahostsupportstheSSLHeartbeatextension,weknowthatitisrunningoneofthesethreeimplementations.Botanisalibrarythatistargetedforclient-sideTLS,andweknowofnopopularwebserverthatisabletousetheBotanTLSlibrary.GnuTLShassupportfortheSSLHeartbeatextension,butitisnotenabledbydefault.3TodetermineifthehostisusingGnuTLS,weobservedthatGnuTLSsup-portstheMaxFragmentLengthSSLextension[1],whichisenabledbydefault,whileOpenSSLhasneversupportedthisextension.Thus,ifweobserveahostthatsupportstheSSLHeartbeatextensionbutnottheMaxFragmentLengthex-tension,wedeclarethathosttohavebeenrunningaversionofOpenSSLthatwasvulnerable(seeFigure3foragraphicalrepresentation).TocollectthelistofsitesthatwereevervulnerabletoHeartbleed,werstextractedthesetofIPaddressesintheApril28,2014Rapid7scanthatwereadvertisingacerti-catewithaCommonNameintheAlexaTop-1Mlist.Wefound5,951,763uniqueIPaddressesinthisset.WethenconnectedtotheseIPaddresses,performedtheTLSnego-tiation,determinedtheSSLextensionsthatthehostsup-ported,anddeterminedwhetherthehostwasstillvulner-abletotheHeartbleedvulnerability.WealsodownloadedthesetofCAcerticatesthatthehostadvertised,whichweusedtoaidcerticatevalidation(seex3.2).Limitations.Ourmethodologyforinferringahost'svul-nerabilitytoHeartbleedhasthefollowinglimitations.Be-causewedidourscanthreeweeksafterHeartbleedwasan-nounced,wemayhavebothfalsepositivesandfalseneg-ativesindetectingwhetherahostwasevervulnerabletoHeartbleed.Forfalsepositives,hoststhatwereupgradeddirectlyfromOpenSSL0.9.8toOpenSSL1.0.1g(i.e.,by-passingtheHeartbleedbug)wouldbeincorrectly aggedasbeingvulnerableinthepast.Wesuspectthisfractionissmall,asthiswouldhavehadtohavehappenedbetweenApril7th(thereleaseofOpenSSL1.0.1g)andApril28th(ourscan),butweareunabletoestimatethefractionofhoststhiscovers.Forfalsenegatives,administratorswhorespondedtoHeartbleedbyeitherrecompilingOpenSSLwith 3Infact,inourscan,wedidnotdiscoveranyhoststhatwererunningGnuTLSwithSSLHeartbeatsenabled. 0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 11/2013 12/2013 01/2014 02/2014 03/2014 04/2014 05/2014 Fraction of NewCertificates ValidatedDateSwitch toreconstructedchainsHeartbleed Connect to sitevia SSL SupportsHeartbeats? SupportsMax Fragment Length? YesYesNever vulnerableNever vulnerable(likely GnuTLS)Was vulnerable Figure4:Exampleoflifetime,forcerticatesform.scotrail.co.uk.AllhostsexceptoneswitchtoanewcerticateafterFebruary10,2014.-DOPENSSL_NO_HEARTBEATSorwhodowngradedtheirOpenSSLimplementationtoversion0.9.8wouldhavetheirhostsincorrectly aggedasneverhavingbeenvul-nerable.Wearesimilarlyunabletodeterminethefractionofhostsinourdatasetthatthisappliesto;wesuspectitissmallaswell,asmanyoperatingsystemsvendors(e.g.,Ubuntu)pushedoutaHeartbleedsecurityupdatethatisusuallyautomaticallyapplied.Vericationofvulnerabilitydetection.WeperformedabriefexperimenttoestimatethefalsenegativerateofourHeartbleedvulnerabilitydetectionmechanism.WeuseavulnerabilityscanoftheAlexaTop-1MdomainsconductedbytheauthorsofZMap[37]onApril9,2014,whichcon-tainsalistofhoststheyconrmedtobevulnerabletoHeart-bleed.InourscanonApril28,2014(19daysaftertheZMapscan),wefoundthat8,651ofthesehostswerestilladver-tisingacerticatewiththesameCommonName.Ofthese,1,737(20.1%)werestillvulnerable;theremainderwerelikelypatchedinthemeantime.Usingourngerprintingmethod-ologyabove,wewouldhaveinferredthat8,483(98.1%)ofthehostswererunningaversionofOpenSSLthatwasvul-nerableatsomepoint(despitethefactthatthemajorityofthesewereactuallynolongervulnerable).Thishighrateofrecall,coupledwiththeunlikelihoodoffalsenegatives,leadsustoconcludethatourmethodologyforinferringpreviousvulnerabilityishighlyaccurate.4.ANALYSISWenowturntoexaminethecollectedSSLcerticatedata.Werstpresentafewdenitionsweuseintheanalysisbe-foreproceeding.4.1DenitionsWeareconcernedwiththeevolutionofSSLcerticates(i.e.,whenarenewcerticatescreated,oldonesretired,etc.).Toaidinunderstandingthisevolution,wedenethefollowingnotions:Certicatebirth:WedenethebirthofanSSLcerti-catetobethedateoftherstscanwhereweobservedanyhostadvertisingthatcerticate.Forhoststhatweobservedadvertisingacerticateontheveryrstscan(October30,2013),wedenethesecerticatestohavenobirthdate,sincewedonotknowwhentheywererstadvertised.4 4Ofcourse,somecerticatesmayhavebeenmissedontherstscanifthehostwasdown;thesecerticateswouldlikely Figure5:Numberofcerticatebirth,deaths,reissues,andrevocationsovertime.Notethelogscaleonthey-axis.Certicatedeath:Deningthedeathofacerticateismorecomplicated,asweobserveanumberofinstanceswheremanyhostsadvertiseagivencerticate,andthenallbutoneorafewofthehostsswitchovertoanewcerticate(presumably,thesiteintendedtoretiretheoldcerticate,butmissedsomeofthehosts).Tohandlethesecases,wecalculatethemaximumnumberofhoststhatwereeverad-vertisingeachcerticate.WethendenethedeathofanSSLcerticatetobethelastdatethatthenumberofhostsadvertisingthecerticatewasabove10%ofthatcerticate'smaximum.The10%thresholdpreventsusfromincorrectlyclassifyingcerticatesthatarestillwidelyavailableasdead,evenifthecerticatehasbeenreissued.Notethatcerti-catesmaynothaveadeathdateifthecerticateisstilladvertisedbymanyIPaddressesonourlastscan.AnexampleofcerticatelifetimeisshowninFigure4,forthecerticatesform.scotrail.co.uk.AllhostsexceptoneswitchtoanewcerticateafterFebruary10,2014;thislonehostnallyswitchesonApril28,2014.Inthiscase,wewouldconsiderthedeathdateoftheoldcerticatetobeFebruary10,2014(asindicatedinthegure),andwewouldconsiderthenewcerticatetohavenodeathdate.Basedonthesedenitions,wecannowdenethenotionofacerticatereissueandrevocation:Certicatereissue:Weconsideracerticatetobereissuedifthefollowingthreeconditionshold:(a)weobservethecerticatedie,and(b)weobserveanewcerticateforthesameCommonNamebornduringascanwithin10days5ofthecerticate'sdeath,and(c)weobserveatleastoneIPaddressswitchfromtheoldcerticatetothenewbetweenthetwoscans.Wedenethedateofthecerticatereissuetobethedateofthecerticate'sdeath.Forthesakeofclarity,werefertotheoldcerticatethatwasreplacedastheretiredcerticate.Certicaterevocation:Weconsideracerticatetobere-vokedifthecerticate'sserialnumberappearsinanyofthecerticate'sCRLs.ThedateofrevocationisprovidedintheCRLentry. showupinthesecondscan(andwouldhaveabirthdateofthenextscan).ThisisthecauseofthesmallspikeinbirthsonNovember2,2013inFigure5.5Wechoose10daysasathresholdasthisisthemaximumdierencebetweentwosuccessivescans. 0 2 4 6 8 10 12 14 16 18 20 11/2013 12/2013 01/2014 02/2014 03/2014 04/2014 05/2014 Number of Unique HostsAdvertising CertificateDateInferred reissue date Old certificate New certificate 1 10 100 1000 10000 100000 11/2013 12/2013 01/2014 02/2014 03/2014 04/2014 05/2014 Number of Certificates/DayDateHeartbleed Birth Death Reissue Revoke Figure6:FractionofdomainsthathaveatleastonehostthatwasevervulnerabletoHeartbleedasafunctionofAlexarank,aswellasdomainsthatcontinuedtobevulnerableattheendofthestudy.InFigure5,wepresentthenumberofcerticatebirths,deaths,reissues,andrevocationsperdayovertime.Thenumberofbirthsisalmostalwayslargerthanthenumberofdeaths,meaningthatthetotalnumberofcerticatesin-the-wildisincreasingovertime.Furthermore,weobservealargespikeinallfoureventsinthewakeofHeartbleed,withanespeciallylargeincreaseinthenumberofrevocations.Forexample,weseeanaverageof29certicaterevocationsperdaybeforeHeartbleed;afterHeartbleed,thisjumpstoanaverageof1,414revocationsperday.4.2HeartbleedPrevalenceWepresentabriefanalysisonthenumberofcerticateshostedbymachinesthatwereevervulnerabletoHeartbleed.Ofthe428,552leafcerticatesthatwerestillaliveonthelastscan,weobserve122,832(28.6%)ofthemadvertisedbyahostthatwaslikelyvulnerabletoHeartbleedatsomepointintime.6Thesecerticatesarefor117,112uniqueCommonNamesandcomefrom70,875uniqueAlexaTop-1Mdomains.Ofthesecerticates,11,915certicates(from10,366uniquedomains)wereonhoststhatwerestillvul-nerableatthetimeofourcrawl(April30,2014,overthreeweeksaftertheannouncementofHeartbleed).Thisresultdemonstratesthateveninthewakeofawell-publicized,se-veresecurityvulnerability,around10%ofvulnerablesiteshavenotyetaddressedtheunderlyingissuethreeweeksaf-terthefact.InFigure6,wepresentthefractionofdomainsthathaveatleastoneSSLhostthatwasevervulnerabletoHeart-bleed(orstillwasasofApril30,2014).Wecanobserveaslightincreaseinlikelihoodofeverbeingvulnerableforthemostpopularsites,butthedistributionquicklystabilizes.Again,theincreasedlikelihoodofbeingvulnerableislikelybecausethesesiteshavelargernumbersofhosts.ThistrendismirroredinthehoststhatarestillvulnerableonApril30,2014.4.3CerticateReissuesWenowexaminethereissuingofSSLcerticatesinthewakeofHeartbleed.NotallSSLcerticatereissuesthatweobservefollowingHeartbleed'sannouncementareduetotheHeartbleedvulnerability.Inparticular,reissuescanhappen 6Thisfractionissomewhathigherthanthe17%ofsitesthatNetcraftfoundtobevulnerable[22],butwenotethatwearemeasuringcerticatesfromtheAlexaTop-1MwhileNetcraftismeasuringallSSL-enabledsitesontheInternet. Figure7:Cumulativedistributionofthenumberofdaysbeforeexpirationthatcerticatesarereissued.foratleasttwootherreasons:First,theoldcerticatecouldbeexpiringsoon,andtheorganizationreissuesthecerticateasitwouldnormally.InFigure7,wepresentthecumulativedistributionofthenumberofdaysbeforeexpirythatweobservecerticatesbeingreissued.Weseethatover50%ofcerticatesarereissuedwithin60daysoftheirexpirydate(withalongtail).Second,asitemayperiodicallyreissuecerticatesasamatterofpolicy(eveniftheoldcerticatewasnotnearexpiration).Forexample,Figure8presentsagraphshowingtheprevalenceofthewww.google.comcerticatesovertime,witheachlinerepresentingthenumberofhostsadvertisingadierentcerticate.Googletypicallyreissuesthiscerticateeverytwoweeks,despitethefactthatthecerticatesaretypicallyvalidformorethanthreemonths.Inthisstudy,wewouldliketobeabletodistinguishaHeartbleed-inducedcerticatereissuefromareissuethatwouldotherwisehavehappenedanyway.Wedenethereis-sueofacerticatetobeHeartbleed-inducedifallthreeofthefollowingconditionshold:1.ThedateofreissuewasonorafterApril7,2014(thedayHeartbleedwasannounced).WenotethatasmallnumberoforganizationswereinformedaboutHeart-bleedbeforethepublicannouncement;asthislistisnotfullyknown,wedonotconsiderthemseparately.2.Thecerticatethatisreissuedwasgoingtoexpiremorethan60daysafterthereissue.Thiseliminatescerticatesthatwereverylikelytobereissuedinthenearfutureanyway. Figure8:Exampleofcerticatebirthanddeathforcer-ticatesforwww.google.com.Googlereissuesthiscerticateaboutonceeverytwoweeks(eachimpulserepresentsadif-ferentcerticate). 0 0.1 0.2 0.3 0.4 0.5 0.6 0 200k 400k 600k 800k 1M Fraction of DomainsAlexa Site Rank (bins of 10,000)Was ever vulnerable Still vulnerable on 2014-04-30 0 0.2 0.4 0.6 0.8 1 0 50 100 150 200 250 300 350 400 CDFDays before Certificate Expiry 0 500 1000 1500 2000 2500 3000 3500 11/2013 12/2013 01/2014 02/2014 03/2014 04/2014 05/2014 Number of Unique HostsAdvertising CertificateDate Figure9:NumberofHeartbleed-inducedandnon-Heartbleed-inducedcerticatereissuesovertime.3.WedonotobservemorethantwootherreissuesforcerticateswiththatCommonNameinthetimebe-foreHeartbleed.Thisimpliesthatcerticateswiththatnamedonottypicallygetreissuedmorethanonceevery3months(asfaraswecanobservefromourdataset),asourdatasetbeginsonOctober30,2013(slightlyover5monthsbeforetheannouncementoftheHeartbleedvulnerability).Thus,fortheexamplesshownsofar,wewouldnothaveconsideredthereissueoftheretiredcerticateinFigure4tobeHeartbleed-induced(asithappenedbeforeHeartbleed),andwewouldalsohavenotconsideredanyofGoogle'sreis-suesinFigure8tobeHeartbleed-induced(becauseweob-servedatotalof12reissuesofcerticateswiththatCom-monNamepriortoHeartbleed).ItisimportanttonotethatHeartbleed-inducedreissuescanhappenforcerticatesthatweneverobservedonavulnerablehost,eitherbecausewefalselydeclaredthecerticatetonotbevulnerable(seex3.4)orbecausethesitereissuedoutofanabundanceofcaution,eventhoughtheywerenotactuallyvulnerable.Giventhesethreeconditions,weexpectthatourestimateofHeartbleed-inducedreissuesisastrictlowerbound.Heartbleed-inducedreissues.Overall,weobserve36,781certicatereissuesthatwedeclaretobeHeartbleed-inducedinthethreeweeksfollowingtheannouncement;thisis8.9%ofallcerticatesthatwerealiveatthetimeHeart-bleedwasannounced.InFigure9,wepresentthenumberofHeartbleed-inducedandnon-Heartbleed-inducedcerti-catereissuesovertime.Weobservethatthenumberofnon-Heartbleed-inducedreissuesisrelativelystable|evenafterHeartbleed|suggestingourdesignationofHeartbleed-inducedreissuesislikelyaccurate.Theslightspikeinnon-Heartbleed-inducedreissuesafterApril7mayre ectthatourapproachyieldsaconservativeunderestimateofthenumberofHeartbleed-inducedreissues.Next,weexaminethefractionofsitesthathaveatleastoneHeartbleed-inducedcerticatereissue,asafunctionofAlexarank.Figure10presentstheseresults;wecanobserveastrongcorrelationwithAlexarank.Higher-rankedsitesaremuchmorelikelytohavereissuedatleastonecerticateduetoHeartbleed(eventhoughtheyareonlyslightlymorelikelytohavebeenvulnerable,asobservedinFigure6).Thisresultcomplementspreviousstudies'ndingsthatmorepopularwebsitesoftenexhibitmoresoundadministrativepractices[8,17].Vulnerablecerticates.Next,weexaminethecerticatesthatshouldhavebeenreissued(regardlessofwhetherthey Figure10:FractionofdomainsthathaveatleastoneHeartbleed-inducedreissue/revocationasafunctionofAlexarank.actuallywere);werefertothesecerticatesasvulnerablecerticates.Wedeclareacerticatetobevulnerableifthefollowingthreeconditionshold:1.ItsdateofbirthwasbeforeApril7,2014,2.IthasnotexpiredasofApril30,and3.Itwasadvertisedbyatleastonehostthatwas(oris)vulnerabletoHeartbleed.Inotherwords,thesecerticatesarevulnerablebecausetheirassociatedprivatekeyscouldhavebeenstolenbyat-tackers.Overall,wend107,712vulnerablecerticates.Ofthese,weobservethatonly28,652(26.7%)havebeenreissuedasofApril30.Theremaining79,060(73.3%)vulnerablecerti-catesthathavenotbeenreissuedcomefrom55,086dier-entAlexaTop-1Mdomains.Thus,thevastmajorityofSSLcerticatesthatwerepotentiallyexposedbytheHeartbleedbugremainin-useoverthreeweeksafterthevulnerabilitywasannounced.Reissueswithsamekey.Systemadministratorswhobe-lievethattheirSSLprivatekeymayhavebeencompromisedshouldgenerateanewpublic/privatekeypairwhenreissu-ingtheircerticate.Wenowexaminehowfrequentlythisisdone,bothinthecaseofnormalcerticatereissuesandforHeartbleed-inducedreissues.Werstobservethat,ingeneral,reissuingacerticateusingthesamepublic/privatekeypairisquitecommon.Figure11presentsthefractionofallnewcerticatesthatusethesamekeyastheonetheyarereplacing;upto53%ofallreissuedcerticatesdoso.Thishighlevelofkeyreuseis Figure11:Fractionofnewcerticatesthatusethesamepublic/privatekeypairasthekeytheyarereplacing. 0 0.05 0.1 0.15 0.2 0.25 0.3 0 200k 400k 600k 800k 1M Fraction of Sites withHeartbleed-inducedReissue/RevocationAlexa Site Rank (bins of 10,000)Reissue Revocation 0 0.1 0.2 0.3 0.4 0.5 0.6 11/2013 12/2013 01/2014 02/2014 03/2014 04/2014 05/2014 Fraction of New CertificatesReissued with the Same KeyDate of BirthHeartbleed All reissues Heartbleed-induced reissues 0 500 1000 1500 2000 2500 3000 3500 4000 11/2013 12/2013 01/2014 02/2014 03/2014 04/2014 05/2014 Number of Certificates/DayDateHeartbleed Non-Heartbleed-induced Heartbleed-induced Figure12:NumberofdomainsthatrevokedatleastonecerticateovertimeforthemonthbeforeandafterHeart-bleed.atleastpartiallyduetosystemadministratorsre-usingthesameCerticateSigningRequest(CSR)whenrequestingthenewcerticatefromtheirCA.InthewakeofHeartbleed,weobserveasignicantdropinthefrequencyofreissuingcerticateswiththesamekey;thisresultindicatesthatsitesaregeneratinganewkeypairmorefrequently.However,ifwefocusontheHeartbleed-inducedreissues,weobservethatanon-trivialfraction(4.1%)ofthesecerticatesarereissuedwiththesamekey(therebydefeatingthepurposeofreissuingthecerticate).Infact,weobserveatotalof912suchcerticatescomingfrom747distinctAlexadomains.4.4CerticateRevocationWenowturntoinvestigatingcerticaterevocationbefore,during,andaftertherevelationofHeartbleed.Recallthatitiscriticalthatavulnerablecerticateberevoked:evenifasitereissuesanewcerticate,ifanattackergainedaccesstothevulnerablecerticate'sprivatekey,thenthatattackerwillbeabletoimpersonatetheowneruntileitherthecerti-cateexpiresorisrevoked.7Westudybothrevocationandexpirationhere,andcorrelatethemwithratesofreissue.Contrarytostandardassumptions,wendthatrevocationandreissuesdonothappensimultaneously.Overallrevocationrates.Figure5showsthenumberofcerticaterevocationsovertime;asnotedabove,theav-eragejumpsfrom29certicatesrevokedperdayto1,414post-Heartbleed.However,thespikeonApril16,2014issomewhatmisleading,asitwaslargelyduetothemass-revocationof19,384CloudFlarecerticatesoftheformss-lXXXXX.cloudflare.com[31].Tomitigatethisissue,weplotinFigure12thenumberofuniquedomainsthatrevokedatleastonecerticateovertime.Wemakethreeinterestingobservations:First,themagnitudeoftheHeartbleed-inducedspikeisgreatlyre-duced,butwestillobserveanup-to-40-foldincreaseinthenumberofdomainsissuingrevocationsperday.Second,weobservethatthenumberofdomainsissuingrevocationsfallsclosertoitspre-HeartbleedlevelbyApril28th,suggestingthatmostofthedomainsthatwillrevoketheircerticateindirectresponsetoHeartbleedalreadyhave. 7Wenotethatrevocationaloneisofteninsucienttopre-ventimpersonation,asanattackermaybeabletopreventtheclientfromaccessingtheCRL.Inthiscase,manywebbrowsersstillacceptthecerticateasvalid[18]. Figure13:Fractionofreissuedcerticatesthatarerevokedwithintwoweeksofbeingretired.AsignicantincreaseinrevocationprobabilityisobservedafterHeartbleed.Third,weobservethree\dips"inthepost-Heartbleedre-vocationrateonApril13th,April20th,andApril27th|allweekends,indicatingthatfarfewerrevocationsoccurontheweekendrelativetotherestoftheweek.Thisperiodicitycanalsobe(less-easily)observedinthepre-Heartbleedtimeframe.Itisreasonabletoassumerevocationsdiponweek-endsbecausehumansareinvolvedintherevocationprocess,howeveritisnotclearwhoisresponsibleforthedelays:isitsiteadministratorsorCRLmaintainersatCAs(orboth)whoarenotworkingonweekends?Regardlessofwhoisre-sponsible,theseweekenddelaysareproblematicforonlinesecurity,sincevulnerabilities(andtheattackerswhoexploitthem)donottakeweekendso.Revocationofreissuedcerticates.Wenowexaminethefractionofretiredcerticates(i.e.,oldcerticatesthathavebeensupersededbyareissuedcert)thatarerevokedwithintwoweeksofbeingretired.Figure13plotsthisfrac-tionovertime.Forexample,thepointonMarch3,2014showsthat2.2%ofthecerticatesretiredonthatdaywererevokedbyMarch17,2014.Overall,weseethatbetween2%and3%ofcerticatesbeingretiredareeventuallyre-voked.ThisprobabilityincreasesbyanorderofmagnitudeafterHeartbleed,withalmost40%ofretiredcerticatesbe-ingrevokedquicklyafterwards.ThisresultsuggeststhatthereasonmanycerticateswerereissuedjustafterApril7wasbecauseofHeartbleed,sincetheretiredcerticateswerealsorevoked.Thiscontrastswithcerticatesthatarereis-suedduetoimpendingexpiration,inwhichcasetheretiredcerticatedoesnotneedtoberevoked.Heartbleed-inducedrevocations.Similartocerticatereissues,notallcerticaterevocationsafterApril7,2014arenecessarilyduetoHeartbleed(e.g.,thesitecouldhaveexposedtheirprivatekeyduetoadierentvulnerability).WethereforedeneaHeartbleed-inducedrevocationtobeacerticaterevocationwherethecerticatehadaHeartbleed-inducedreissue(seex4.3).Overall,weobserve14,726Heartbleed-inducedrevoca-tions;thiscorrespondsto40%ofallHeartbleed-inducedreissuedcerticates.Thus,60%ofallcerticatesthatwerereissuedduetoHeartbleedwerenotrevoked,implyingthat,ifthecerticate'sprivatekeywasactuallystolen,theat-tackerwouldbeabletoimpersonatethevictimwithoutanyclientsbeingabletodetectit.Figure10presentsthefractionofsitesthathaveatleastoneHeartbleed-inducedcerticaterevocation,asafunctionofAlexarank.Revocationsfollowasimilartrendtoreis- 0 200 400 600 800 1000 1200 03/01 03/08 03/15 03/22 03/29 04/05 04/12 04/19 04/26 Number of Domains/DayDateHeartbleedWeekend 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 11/2013 12/2013 01/2014 02/2014 03/2014 04/2014 05/2014 Fraction of CertificatesRevoked within Two Weeksof Being RetiredDate of RetirementHeartbleed Figure14:Cumulativedistributionofthenumberofdaysbetweenwhenacerticateisreissuedandwhenitisrevoked.Positivevaluesindicatethecerticateisreissuedbeforeitisrevoked;negativevaluesindicatetheopposite.sues,i.e.,siteswithhighrankareslightlymorelikelytorevoke.Ideally,thetwolinesinFigure10shouldbecoin-cident,i.e.,allsitesreissuingcerticatesduetoHeartbleedshouldalsohaverevokedtheretiredcerticates(theonlyexceptiontothisruleisiftheretiredcerticatewasabouttoexpireanyway,butweaccountforthisinourdenitionsofHeartbleed-inducedreissuesandrevocations).Thisresulthighlightsaseriousgapinsecuritybest-practicesacrossallofthesitesintheAlexaTop-1M.Finally,weexaminetherevocationspeed,orthenumberofdaysbetweenwhenacerticateisreissuedanditisrevoked.Figure14presentsthecumulativedistributionoftherevoca-tionspeedforbothHeartbleed-inducedandnon-Heartbleed-inducedrevocations.Tomakethedistributionscomparable,weonlylookatdierencesbetween-10and10days(recallthatHeartbleed-inducedreissuesandrevocationscanonlyoccurafterApril7,2014,limitingthatdistribution).Weob-servethatHeartbleed-inducedrevocationsappeartohappenslightlymorequickly,thoughtnottotheextentonemightexpect,giventheurgentnatureofthevulnerability.Wealsoobservethatrevocationalmostalwayshappensafterreissue,whichislikelyexplainedbythemoremanualprocessthatrevocationoftenentails.Thisresultcontradictspreviousassumptions[8]thatrevocationsandreissuesoccursimulta-neously.Finally,itisworthnotingthatthegranularityofourscansmakesgeneralizingtheseresultsdicult,sincewecannottellexactlywhenacerticatewasreissued;however,thetwodistributionsarecomparabletoeachother.Expirationsarenotenough.Todemonstratehowlongtheeectsofthisvulnerabilitycouldbefeltifsitesdonotrevoketheirvulnerablecerticates,weanalyzecerticatesthat,bytheendofourdatacollection,werefoundtobevulnerable(andalive)whenHeartbleedwasannounced,reis-suedthereafter,butneverrevoked.Figure15presentsthedistributionofhowmuchlongersuchcerticateswillcon-tinuetoliveiftheirsitesdonotrevokethem.NotethatthisCDFappearstobepiecewiselinearatintervalsof1year:thisisbecauseexpirationdatesaretypicallysetatintervalsofayear|thatthedistributionisroughlyuni-formwithintheseyearintervalsindicatesthatcerticatesareissuedmostlyuniformlythroughouttheyear.Thisgureshowsthat,withoutrevoking,thevulnerabilityintroducedin2014couldaectclientsthrough2020.Weconcludefromthisthat,giventhemeagerratesofrevocation,itwouldbehelpfulforCAstoshifttoshorterexpirytimesintheircer-ticates. Figure15:Thedistributionoftime-until-expiryforvul-nerable,reissued,butnotrevokedcerticates.Ifthesecer-ticatesareneverrevoked,thisgureshowshowlongtheywillpersist.CRLreasoncodes.TheCRLspecicationallowsthemaintainersofCRLstoincludeareasonforwhyacerticatewasrevokedalongwiththerevocationintheformofasmallsetofreasoncodes.Thereasoncodeisoptional,andtheoptionsrangefrom\Unspecied"to\KeyCompromised"to\PrivilegeWithdrawn"[6].NotethattheCRLreasoncodesarenotnecessarilyveriedbythecerticateauthorities,andtheymaybeincorrect.Forallofthecerticatesthatweobservedtoberevoked,weextractedthereasoncode(ifoneexisted);wepresentthedistributionofthesereasoncodesforbothHeartbleed-inducedandnon-Heartbleed-inducedcerticatereissuesinFigure16.Notethelog-scaleonthex-axis.Wemaketwokeyobservations.First,weseeasigni-cantincreaseintheprobabilityofareasoncodebeingpro-videdatallforHeartbleed-inducedrevocations:only19.2%ofnon-Heartbleed-inducedrevocationsprovideanyreasoncode(includingthe\Unspecied"reasoncode),while27.1%onHeartbleed-inducedrevocationsprovideareasoncode.Second,weobservealargeincreaseinthe\KeyCompro-mise"reasoncode(from0.40%to1.18%ofallCRLentries);giventhatHeartbleedcerticatesarelikelybeingreissued Figure16:DistributionofCRLreasoncodesgivenforbothHeartbleed-inducedandnon-Heartbleed-inducedcer-ticatereissues.Notethelogscaleonthex-axis.Weob-serveanincreaseinreasonsforrevocationsbeinggivenforHeartbleed-inducedreissues,especiallyforthe\KeyCom-promised"reasoncode. 0 0.2 0.4 0.6 0.8 1 -10 -5 0 5 10 CDFDays from Reissue to RevocationNon-Heartbleed-induced Heartbleed-induced 0 0.2 0.4 0.6 0.8 1 0 1 2 3 4 5 6 CDFYears of Remaining Validity 0.0001 0.001 0.01 0.1 1 Fraction of RevocationsNo Reason CodeUnspecifiedKey CompromiseAffiliation ChangeSupersededCessationCertificate HoldPrivilege WithdrawnNon-Heartbleed-induced Heartbleed-induced Figure17:CumulativedistributionofthetimebetweenwhenwedownloadedtheCRLs(6:00pmEST)andthetimeofissuerecordedintheCRL(andsignedbytheCA).MostCAshaveachancetorevokecerticatesatleastonceaday,as95%oftheCAsupdatedtheirCRLswithin24hoursofwhenwedownloadedthem.duetoconcernsthattheprivatekeymayhavebeencompro-mised,thisincreaseisnotunexpected.However,itstillap-pearsthatvastmajorityofCRLentriesaremis-coded.PriorworkhasalsonotedthatCRLsareusuallymis-coded[8],al-thoughthesnapshotwepresentinFigure16isevenmorestark,giventhatweknowHeartbleed-inducedrevocationsshouldhavebeenrevokedwithareasoncodeof\KeyCom-promise".CRLupdateintervals.Thegenerallackofsiteadmin-istratorsrevokingcerticateswhentheyshould(e.g.,afterHeartbleed)couldbeattributedtotheCAsonlyupdatingtheirCRLsonverylongtimescales.Forexample,onerea-sonforthiswouldbeifCAskepttheirprivatekeysonoinehoststhatwouldhavetobepoweredoneverytimetosignCRLs.AnotherreasonwouldbesoclientsdonotneedtodownloadnewCRLsveryoften.Figure17indicatesthatneitherofthesereasonsaretrue.Thisgureshowsthecumulativedistributionofthedier-encebetweenthetimewedownloadedaCRLandthetimeitwasissued.Weseethat95%ofCAssignedafreshCRLwithin24hoursof6:00pmEST(whenwedownloadedtheCRLs).WhenCAssignafreshCRL,theyhavetheopportu-nitytorevokemorecerticates.TheseresultssuggestthatCAscouldrevokecerticatesasoftenaseveryfewhours.Thus,anydelaysintherevocationofcerticatesareduetohumansintheloop:eithercerticateownerswhoarenotre-portingpotentiallycompromisedkeys,orCApersonnelwhoarenotmanuallyaddingnewentriestoCRLsbeforetheyaresignedandshipped.Anotherimportantfactorinthecontextofclientimpactiswhen(andwhether)clientsobtainedthelistofrevocations.Unfortunately,weareunabletoanswerthisquestiongivenourdatacollectionmethodology(itwouldrequireinstru-mentingend-hoststoseewhenpreciselytheirbrowsersandoperatingsystemsfetchedCRLsorissuedOCSPqueries).Suchastudyisaninterestingareaoffuturework.However,thereisoneaspectofthisproblemtowhichwemaybeabletolendinsight;itwasrecentlyreportedthatmanybrowsersdonotevenbothertocheckcerticates'CRLs,withtheexceptionofextendedvalidation(EV)certicates[7].WenextturntoananalysisofhowtheseEVcerticatesarereissuedandrevokedincomparisontotheentirecorpusofcerticates. Figure18:TherateatwhichvulnerablecerticateswerereissuedandrevokedafterHeartbleed'sannouncement.(Notethatthey-axisdoesnotbeginatzero.)4.5ExtendedValidationCerticatesRecallthatoneofthemajorrolesofaCAistovalidatetheidentityofthesubjectsforwhomitissuescerticates.ExtendedValidation(EV)certicatesareameansbywhichCAscanexpressthatthisidentity-vericationprocesshasfollowedasetof(presumablystringent)establishedcriteria.EVcerticatesarestandardX.509certicates,andoernoadditionalsecurityperse,buttherationaleisthatwithamorethoroughvericationprocessbytheCAs,thesecer-ticatescanbemorereadilyveriedandtrustedbyusers.8Thatsaid,thereremainsconcernastowhetherornotthistrustiswell-placed.WeclosethissectionbyinvestigatingtherateatwhichvulnerableEVcerticateswererevokedandreissuedascomparedtotheentireaggregateofcerti-cates.Figure18showsthefractionofvulnerablecerticatesthathaveyettobereissuedorrevokedovertime.Inthisgure,theinitialyvaluesdonotallstartat1.0forreissues:thisisbecause,withcoarsegranularityofourdata,wecannotbecertainwhethersomecerticateswerereissuedimmediatelyafterthescanonApril7,2014,immediatelybeforethescanonApril10,2014,orinbetween.Wethereforeprovidethemostoptimisticpossibility:ifweknowacerticatewasreis-suedbetweendaysdandd+k,thenweplotitashavingbeenreissuedondayd.ThecoarsegranularityofthescansalsoexplainswhythereissuelinesdonotadvancebeyondApril21.Regardless,onetrendthatremainsclearisthatsitesaremoreproactiveinreissuingnewcerticatesthaninrevokingoldones.Thiscontradictspriorassumptionsthatrevoca-tionsandreissuesoccursimultaneously[8].Indeed,itisnotyetcleartouswhyasitewouldreissueavulnerablecerti-catewithoutrevokingit,butthesetrendsdemonstratethatitisacommonpractice,evenforthosewithEVcerticates.Thisgureshowsagenerallybleakviewofhowthoroughlysitesrevokeandreissuetheircerticateswhennecessary.Notethatthey-axisbeginsat0.65:threeweeksaftertherevelationofHeartbleed,over87%ofallcerticateswefoundtobevulnerablehaveyettoberevoked,andover73%ofthemhaveyettobereissued.Ofthosethatdidrevoketheircerticates,wendthatthespeedatwhichtheydidsomatchesthatofearlierstudiesonthespreadofpatches[25,27]:thereisanexponentialdrop-o,followedbyagradualdecline.Specically,the\Notrevoked(all)"linetsthe 8ManybrowserspresentEVcerticateswithagreenboxintheaddressbar,whilenon-EVcerticatesareoftenjustrepresentedwithagraylockicon. 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.1 1 10 100 1000 10000 100000 CDFAge of CRL (hours) 0.65 0.7 0.75 0.8 0.85 0.9 0.95 1 04/07 04/11 04/15 04/19 04/23 04/27 Frac. of Vulnerable Certificatesnot Revoked/ReissuedDateNot revoked (all)Not reissued (all) curve0:179e0:073x+0:830,whilethe\Notrevoked(EV)"linetsthecurve0:144e0:118x+0:859.Overall,EVcerticatesfollowsimilartrendstotheen-tirecorpus,withaslightlyfasterandmorethoroughre-sponse.Interestingly,whileEVcerticateswererevokedmorequickly,theirnon-EVcounterpartscaughtupwithintendays;however,EVcerticateswerereissuedbothmorequicklyandmorethoroughly.Weexpectthattheunder-lyingcauseofthisobservationisaself-selectioneect,i.e.,security-conscioussitesaremorelikelytoseekoutEVcer-ticatesintherstplace.WedoubtthattheadditionalidentityvericationstepsrequiredtoobtainanEVcerti-cateplayalargeroleinthis(slightly)improvedreactiontoHeartbleed.Nonetheless,therearestillmanyvulnerableEVcerticatesthathavenotbeenreissuedtwoweeksaftertheevent(67%)andthathavenotbeenrevokedthreeweeksafter(87%).5.RELATEDWORKOurworkliesattheintersectionoftwogeneralareasofpriorwork:studiesofhoweectivelyadministratorsreacttowidelypublicizedvulnerabilities,andmeasurementsoftheTLS/SSLcerticateecosystem.Tothebestofourknowl-edge,wearethersttolookspecicallyathowpotentiallycompromisedcerticatesarereplacedandrevoked.Vulnerabilitypatching.Therehavebeenseveralstud-iesofhowquicklyandeectivelyadministratorspatchwell-knownsoftwarevulnerabilities.Rescorlameasuredtheresponsetoa2002buerover owvulnerabilityinOpenSSL[27],andRamosinvestigatedhowthefractionofvulnerablesystemschangesaftervarioussecurityholesfrom2000{2005hadbeenpublished[25].Bothofthesestudiesfoundanexponentialdecreaseinthefractionofvulnera-blehostsshortlyafterpublicrevelationofthevulnerability,followedbyagradualdeclinethereafter.Interestingly,inRescorla'sstudy,anothersharpdeclineinthenumberofvulnerablehostsoccurredafterthereleaseoftheSlapperwormwhichexploitedthebuerover ow.CloselyrelatedtoourstudyisthatofYileketal.,whomeasuredtheaftermathofa2008vulnerabilityinDebian'sOpenSSLkeygenerationthatresultedinpredictableRSAkeys[35].Whatmakesthisworkparticularlyrelatedtooursisthatxingthevulnerabilityrequirednotonlypatch-ingOpenSSL,butalsoreissuingnewkeys.Theyfoundthatthisprocessresultedinagradualdeclineinthefractionofvulnerablehosts,asopposedtothesharpexponentialdecaywhenonlypatchingthesoftwareisnecessary.However,be-causetheirdatacollectiononlybeganseveraldaysafterthevulnerabilitywasreleased,thesharpdeclinemayhaveoc-curredbutgoneunnoticed.OurdatacoversmonthsleadinguptoandweeksafterHeartbleed,allowingusmorecon-denceintheinitialdrop-oofvulnerabilities.Ourworkbroadlybuildsonthesepriorstudiesinthatwefocusonadierent,thoughequallyimportant,aspectofthevulnerabilityxingcycle:whenpotentiallycompro-misedcerticateswerenotonlyreplaced,butexplicitlyre-voked.Theconnectionbetweenpatchingsoftware,reissuingnewcerticates,andrevokingoldoneshas,tothebestofourknowledge,notbeenexplicitlystudied.Thoughithadbeenpreviouslybelievedthatrevocationsandreissuesoccursimultaneously[8],ourresultsdemonstratethatrevocationsareoftenosetintime,orsimplyneveroccuratall.Thecerticateecosystem.Infocusingonvulnerabil-ityxingasitpertainstocerticates,ourworkisalsore-latedtorecentstudiesofthecerticateecosystematlarge.Holzetal.[17]performedpassiveandactivemeasurementsonHTTPScerticatesfromtheAlexaTop-1Mdomains.Durumericetal.[8]performedactivemeasurementsusingZMap[10]thatyieldednearly40morecerticatesthanpriorstudies[11,16,17].Broadly,thesestudiesexposedsev-eralgrimpropertiesoftoday'scerticateecosystem,includ-ingweakerkeylengthsthansuggestedbyNIST[3],longercerticatechainsthannecessary,invalidsubjectnames,andsoon.Comparingthesestudiestooneanother,itappearsthattheAlexaTop-1Msites|thoughstillfarfromperfect|domanagecerticatesmoreappropriatelyonaverage,withaslightweighttohigher-rankeddomains.LikeHolzetal.,ourworkfocusessolelyontheAlexaTop-1M;weexpectthatexpandingtomoredomainswould,asDurumericetal.found[8],resultinlesseectivecerticatemanagement,thoughthisisanareaoffuturework.Whilethesestudieshaveshedconsiderablelightonthecerticateecosystem(andfoundittobesurprisinglybleak),ourstudyisthersttoexplicitlyconsiderreissuesandre-vocations,particularlyinthewakeofawidespreadvulner-ability.Durumericetal.[8]brie yinvestigatedcerticaterevocations,andfoundthatamere2.5%ofthecerticatestheyencounteredwereeverrevoked|ofthese,themajoritygavenoreasoncode.ByusingHeartbleedasawide-scalecorrelatedevent,wecomplementthispriorworkbyinvesti-gatingwhichcerticatesshouldhavebeenrevoked,andwhentherevocationsshouldhavetakenplace.Inthecontextofthecerticateecosystem,webelievethistobenovel.Heartbleed.TherecentnatureoftheHeartbleedvulnera-bilitymeanslittlescienticworkhasyettocomeoutstudy-ingthevulnerabilityitselfandthecommunity'sreactiontoit.Themostcloselyrelatedwork|astudyperformedcon-currentlywithourown|presentsacomprehensivestudyofthebreadthofthevulnerability,theclean-up,andsurveysofadministratorswhofailedtopatchtheirservers[9].In-terestingly,thestudyleverageshistoricpackettraces[19]tolookforevidenceofHeartbleedexploitationbeforetheannouncementandndsnoevidencethatthevulnerabil-itywasexploitedbeforehand.Thisstudyandourownarecomplementary|theirsbrie yexaminesSSLcerticatereis-suesandrevocations,andtheresultsoftheiranalysisareinagreementwithours.6.CONCLUDINGDISCUSSIONInthispaper,westudyhowSSLcerticatesarereis-suedandrevokedinresponsetoawidespreadvulnerabil-ity,Heartbleed,thatenabledundetectablekeycompromise.Weconductedlarge-scalemeasurementsanddevelopednewmethodologiesandheuristicstodeterminehowthemostpopular1millionwebsitesreactedtothisvulnerabilityintermsofcerticatemanagement,andhowthisimpactsse-curityforclientsthatusethem.Wefoundthatthevastmajorityofvulnerablecerticateshavenotbeenreissued;further,ofthosedomainsthatreis-suedcerticatesinresponsetoHeartbleed,60%donotre-voketheirvulnerablecerticates|iftheydonoteventuallybecomerevoked,20%ofthosecerticateswillremainvalid(notexpire)fortwoormoreyears.Theramicationsofthisndingsarealarming:modernWebbrowserswillre- mainpotentiallyvulnerabletomaliciousthirdpartiesusingstolenkeystomasqueradeasacompromisedsiteforalongtimetocome.WeanalyzedthesetrendswithvulnerableEVcerticates,aswell,andhavefoundthat,whiletheyex-hibitbettersecuritypractices,theystillremainlargelynotreissued(67%)andnotrevoked(88%)evenweeksafterthevulnerabilitywasmadepublic.Tothebestofourknowledge,ourfocusedstudyoncer-ticatereissuesandrevocationsistherstofitskind.Ourresultsare,insomeways,inlinewithpreviousstudiesontheratesatwhichadministratorspatchedvulnerablesoftware|forinstance,revocationratesfollowedasharpexponentialdrop-oshortlyafterthevulnerabilitywasmadepublic,andtaperedorelativelysoonthereafter.However,unlikewithsoftwarepatches,wendthevastmajorityofcerticateshavestillnotbeenreissuedorrevoked.Thesendingsin-dicatequitesimplythatthecurrentpracticesofcerticatemanagementaremisalignedwithwhatisnecessarytoensureasecurePKI.Surveyingsystemadministrators.Tohelpbetterun-derstandthereasonsbehindthelackofpromptcerticatereissuesandrevocations,weinformallysurveyedafewsys-temsadministrators.WeaskedwhatstepstheyhadtakeninresponsetoHeartbleed:didtheypatch,reissue,andre-voke,andifnot,thenwhynot?Wereceivedsevenresponses.Mostreportedpatchingtheirsystems,typicallyindirectre-sponse,butsomereliedonmanagedserversorautomaticup-datesandthereforetooknoHeartbleed-specicsteps.Therewassomevarianceinwhenpatcheswereapplied,duetoacombinationofscheduledrebootsanddelayedresponsesfromsomevendors,butthemajorityofpatcheswereap-pliedquickly.Forrevokingandreissuing,however,wesawawidespec-trumofbehavior.Fewbothrevokedandreissued,butamongthem,theydidsowithin48hours.Manyneitherrevokednorreissued;acommonreasonprovidedwasthatthevulnerablehostswereeithernothostingsensitivedataorwerenotrunningservicesthatweredeemedsensitiveenoughtowarrantit.Alongsimilarreasons,othersreportedhavingreissuedthecerticatebutnotrevoking,explainingthatthecerticateisonlyforinternaluse.Finally,othersreportedthattheydidnotperceivereissuingandrevokingasimpor-tantbecausetheyhadpatchedquicklyafterthebugwaspubliclyannounced(recall,however,thatthevulnerabilitywasintroducedovertwoyearsprior).Ourresultsfromthissmallsurveyshouldbeviewedanecdotally|amoreextensivesurveyoncerticateadmin-istrationisaninterestingareaoffuturework|buttheydoshedlightonsomeoftherootcausesofwhyrevokingandreissuingarenotonequalfootingwithpatching.Whilead-ministratorsalmostuniversallyunderstandtheimportanceofpatchingafteravulnerability,manydonotappreciateorknowabouttheimportanceofrevokingandreissuingcer-ticateswithnewkeys.Ofthoseadministratorswhodoun-derstandtheimportance,evensomeofthemreportedpush-backfromotherswhoperceivedtheprocessasbeingoverlycomplex.Insum,thispointstotheneedforbroadered-ucationonthetreatmentofcerticates,andperhapsmoreassistancefromCAstohelpensurethatalltheprescribedstepsaretaken.Lessonslearned.OurresultssuggestseveralchangestocommonPKIpracticesthatmayimprovesecurityinprac-tice.First,thepracticesoflowrevocationratesandlongexpirationdatesformadangerouscombination.Techniquesthatautomaterevocationwouldvastlyreducetheperiodduringwhichclientsarevulnerabletomaliciousthirdpar-ties.Similarly,settingreasonablyshortcerticateexpira-tiondates(assuggestedbyTopalovicetal.[34])bydefaultwillsignicantlyreducetheperiodduringwhichvulnera-blecerticatesarevalid.Second,mechanismsthatenableasimultaneousreissue-and-revokeforacerticatewillmakeitlesslikelythatinvalidcerticatesareacceptedbyclients.Third,wehavefoundthatmanydomains,whentheyreissueacerticate,continuetooertheold,vulnerablecerticate,aswell.Giventhelargenumberofcerticatesandhostsusingthemperdomaininourdataset,webelieveadminis-tratorswouldbenetfromtoolsthatmoreeasilytrackandvalidatethesetofcerticatestheyareusing.Futurework.Thispaperis,webelieve,therststepto-wardsunderstandingthemanualprocessofreissuingandrevokingcerticatesinthewakeofavulnerability.Severalinterestingopenproblemsremain.BecauseourdatafocusesontheserverandCAsideofthePKIecosystem,weareunabletodrawanydirectconclusionsastowhatclientsexperience.Ahost-centeredmeasurementstudywould,forinstance,allowustounderstandnotonlywhenrevocationswereaddedtoCRLs,butwhenclientsactuallyreceivedtheCRLs.Moreover,ourstudyopensmanyquestionsastowhythecerticatereissueandrevocationprocessesaresoexten-sivelymismanaged.Ourresultsreinforcepreviousndingsthatsitepopularityiscorrelatedwithgoodsecurityprac-tices,buteventhehighestrankedAlexawebsitesshowrela-tivelyanemicratesofreissuesandrevocations.Understand-ingtherootcausesisanimportantsteptowardsdevelopingsecureinfrastructuresthateectivelyincorporate(ormiti-gate)theend-useradministrators.Opensource.Ouranalysisreliedonbothexisting,publicsourcesofdataandthosewecollectedourselves.Wemakeallofourdataandouranalysiscodeavailabletotheresearchcommunityathttps://ssl-research.ccs.neu.eduAcknowledgmentsWethanktheanonymousreviewersandourshepherd,Je-lenaMirkovic,fortheirhelpfulcomments.WealsothankRapid7forcollectingtheSSLcerticatedata,theauthorsofZMapforcollectingtheHeartbleedvulnerabilitydata,andformakingitpubliclyavailable.Finally,wethankoursurveyrespondentsfortheircandidresponses.ThisresearchwassupportedinpartbyNSFgrantsCNS-1054233,CNS-1319019,andCNS-1150177,andanAmazonWebServicesinEducationgrant.7.REFERENCES[1]D.E.3rd.TransportLayerSecurity(TLS)Extensions:ExtensionDenitions,Jan.2011.IETFRFC-6066.[2]AlexaTop1MillionDomains.http://s3.amazonaws.com/alexa-static/top-1m.csv.zip.[3]E.Barker,W.Barker,W.Burr,W.Polk,andM.Smid.RecommendationforKeyManagement{Part1:General(Revision3),2012.NISTSpecialPublication800-57. [4]BotanSSLLibrary.http://botan.randombit.net.[5]CERTVulnerabilityNoteVU#720951:OpenSSLTLSheartbeatextensionreadover owdisclosessensitiveinformation.http://www.kb.cert.org/vuls/id/720951.[6]D.Cooper,S.Santesson,S.Farrell,S.Boeyen,R.Housley,andW.Polk.InternetX.509PublicKeyInfrastructureCerticateandCerticateRevocationList(CRL)Prole.IETFRFC-5280,May2008.[7]R.Duncan.Howcerticaterevocation(doesn't)workinpractice,2013.http://news.netcraft.com/archives/2013/05/13/how-certificate-revocation-doesnt-work-in-practice.html.[8]Z.Durumeric,J.Kasten,M.Bailey,andJ.A.Halderman.AnalysisoftheHTTPScerticateecosystem.InACMInternetMeasurementConference(IMC),2013.[9]Z.Durumeric,J.Kasten,F.Li,J.Amann,J.Beekman,M.Payer,N.Weaver,J.A.Halderman,V.Paxson,andM.Bailey.ThematterofHeartbleed.InACMInternetMeasurementConference(IMC),2014.[10]Z.Durumeric,E.Wustrow,andJ.A.Halderman.ZMap:FastInternet-wideScanningandItsSecurityApplications.InUSENIXSecuritySymposium,2013.[11]P.EckersleyandJ.Burns.AnobservatoryfortheSSLiverse.InDefcon18,2010.https://www.eff.org/files/DefconSSLiverse.pdf.[12]F.F.Elwailly,C.Gentry,andZ.Ramzan.QuasiModo:Ecientcerticatevalidationandrevocation.InPublicKeyCryptography(PKC),2004.[13]P.Evans.Heartbleedbug:RCMPaskedRevenueCanadatodelaynewsofSINthefts,2014.http://www.cbc.ca/news/business/heartbleed-bug-rcmp-asked-revenue-canada-to-delay-news-of-sin-thefts-1.2609192.[14]Faketimelibrary.http://www.code-wizards.com/projects/libfaketime/.[15]B.Grubb.Heartbleeddisclosuretimeline:whoknewwhatandwhen,2014.http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140415-zqurk.html.[16]N.Heninger,Z.Durumeric,E.Wustrow,andJ.A.Halderman.MiningyourPsandQs:Detectionofwidespreadweakkeys.InUSENIXSecuritySymposium,2012.[17]R.Holz,L.Braun,N.Kammenhuber,andG.Carle.TheSSLlandscape{AthoroughanalysisoftheX.509PKIusingactiveandpassivemeasurements.InACMInternetMeasurementConference(IMC),2011.[18]Revocationdoesn'twork.https://www.imperialviolet.org/2011/03/18/revocation.html.[19]S.Kornexl,V.Paxson,H.Dreger,A.Feldmann,andR.Sommer.Buildingatimemachineforecientrecordingandretrievalofhigh-volumenetworktrac.InACMInternetMeasurementConference(IMC),2005.[20]MacOSX10.9.2RootCerticates.http://support.apple.com/kb/HT6005.[21]S.Micali.NOVOMODO:ScalablecerticatevalidationandsimpliedPKImanagement.InPKIResearchWorkshop,2002.[22]P.Mutton.Halfamillionwidelytrustedwebsitesvulnerabletoheartbleedbug,2014.http://news.netcraft.com/archives/2014/04/08/half-a-million-widely-trusted-websites-vulnerable-to-heartbleed-bug.html.[23]M.NaorandK.Nissim.Certicaterevocationandcerticateupdate.InUSENIXSecuritySymposium,1998.[24]OpenSSLProject.https://www.openssl.org.[25]T.Ramos.Thelawsofvulnerabilities.InRSAConference,2006.http://www.qualys.com/docs/Laws-Presentation.pdf.[26]Rapid7SSLCerticateScans.https://scans.io/study/sonar.ssl.[27]E.Rescorla.Securityholes...Whocares?InUSENIXSecuritySymposium,2003.[28]R.L.Rivest.Canweeliminatecerticaterevocationlists?InFinancialCryptography(FC),1998.[29]S.Santesson,M.Myers,R.Ankney,A.Malpani,S.Galperin,andC.Adams.X.509InternetPublicKeyInfrastructureOnlineCerticateStatusProtocol-OCSP,June2013.IETFRFC-6960.[30]R.Seggelmann,M.Tuexen,andM.Williams.TransportLayerSecurity(TLS)andDatagramTransportLayerSecurity(DTLS)HeartbeatExtension,Feb.2012.IETFRFC-6520.[31]N.Sullivan.TheHeartbleedAftermath:allCloudFlarecerticatesrevokedandreissued,2014.http://blog.cloudflare.com/the-heartbleed-aftermath-all-cloudflare-certificates-revoked-and-reissued.[32]N.Sullivan.TheResultsoftheCloudFlareChallenge,2014.http://blog.cloudflare.com/the-results-of-the-cloudflare-challenge.[33]TheGnuTLSTransportLayerSecurityLibrary.http://www.gnutls.org.[34]E.Topalovic,B.Saeta,L.-S.Huang,C.Jackson,andD.Boneh.Towardshort-livedcerticates.InWeb2.0Security&Privacy(W2SP),2012.[35]S.Yilek,E.Rescorla,H.Shacham,B.Enright,andS.Savage.Whenprivatekeysarepublic:Resultsfromthe2008DebianOpenSSLvulnerability.InACMInternetMeasurementConference(IMC),2009.[36]P.Zheng.Tradeosincerticaterevocationschemes.InACMComputerCommunicationReview(CCR),2013.[37]ZMapVulnerableHosts.https://zmap.io/heartbleed/vulnerable.html. [4]BotanSSLLibrary.http://botan.randombit.net[5]CERTVulnerabilityNoteVU#720951:OpenSSLTLSheartbeatextensionreadover\rowdisclosessensitiveinformation.http://www.kb.cert.org/vuls/id/720951[6]D.Cooper,S.Santesson,S.Farrell,S.Boeyen,R.Housley,andW.Polk.InternetX.509PublicKeyInfrastructureCerti\fcateandCerti\fcateRevocationList(CRL)Pro\fle.IETFRFC-5280,May2008.[7]R.Duncan.Howcerti\fcaterevocation(doesn't)workinpractice,2013.http://news.netcraft.com/archives/2013/05/13/how-certificate-revocation-doesnt-work-in-practice.html[8]Z.Durumeric,J.Kasten,M.Bailey,andJ.A.Halderman.AnalysisoftheHTTPScerti\fcateecosystem.InACMInternetMeasurementConference(IMC),2013.[9]Z.Durumeric,J.Kasten,F.Li,J.Amann,J.Beekman,M.Payer,N.Weaver,J.A.Halderman,V.Paxson,andM.Bailey.ThematterofHeartbleed.InACMInternetMeasurementConference(IMC)2014.[10]Z.Durumeric,E.Wustrow,andJ.A.Halderman.ZMap:FastInternet-wideScanningandItsSecurityApplications.InUSENIXSecuritySymposium,2013.[11]P.EckersleyandJ.Burns.AnobservatoryfortheSSLiverse.InDefcon18,2010.https://www.eff.org/files/DefconSSLiverse.pdf[12]F.F.Elwailly,C.Gentry,andZ.Ramzan.QuasiModo:Ecientcerti\fcatevalidationandrevocation.InPublicKeyCryptography(PKC),2004.[13]P.Evans.Heartbleedbug:RCMPaskedRevenueCanadatodelaynewsofSINthefts,2014.http://www.cbc.ca/news/business/heartbleed-bug-rcmp-asked-revenue-canada-to-delay-news-of-sin-thefts-1.2609192[14]Faketimelibrary.http://www.code-wizards.com/projects/libfaketime/[15]B.Grubb.Heartbleeddisclosuretimeline:whoknewwhatandwhen,2014.http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140415-zqurk.html[16]N.Heninger,Z.Durumeric,E.Wustrow,andJ.A.Halderman.MiningyourPsandQs:Detectionofwidespreadweakkeys.InUSENIXSecuritySymposium,2012.[17]R.Holz,L.Braun,N.Kammenhuber,andG.Carle.TheSSLlandscape{AthoroughanalysisoftheX.509PKIusingactiveandpassivemeasurements.InACMInternetMeasurementConference(IMC),2011.[18]Revocationdoesn'twork.https://www.imperialviolet.org/2011/03/18/revocation.html[19]S.Kornexl,V.Paxson,H.Dreger,A.Feldmann,andR.Sommer.Buildingatimemachineforecientrecordingandretrievalofhigh-volumenetworktrac.InACMInternetMeasurementConference(IMC)2005.[20]MacOSX10.9.2RootCerti\fcates.http://support.apple.com/kb/HT6005[21]S.Micali.NOVOMODO:Scalablecerti\fcatevalidationandsimpli\fedPKImanagement.InResearchWorkshop,2002.[22]P.Mutton.Halfamillionwidelytrustedwebsitesvulnerabletoheartbleedbug,2014.http://news.netcraft.com/archives/2014/04/08/half-a-million-widely-trusted-websites-vulnerable-to-heartbleed-bug.html[23]M.NaorandK.Nissim.Certi\fcaterevocationandcerti\fcateupdate.InUSENIXSecuritySymposium1998.[24]OpenSSLProject.https://www.openssl.org[25]T.Ramos.Thelawsofvulnerabilities.InRSAConference,2006.http://www.qualys.com/docs/Laws-Presentation.pdf[26]Rapid7SSLCerti\fcateScans.https://scans.io/study/sonar.ssl[27]E.Rescorla.Securityholes...Whocares?InUSENIXSecuritySymposium,2003.[28]R.L.Rivest.Canweeliminatecerti\fcaterevocationlists?InFinancialCryptography(FC),1998.[29]S.Santesson,M.Myers,R.Ankney,A.Malpani,S.Galperin,andC.Adams.X.509InternetPublicKeyInfrastructureOnlineCerti\fcateStatusProtocol-OCSP,June2013.IETFRFC-6960.[30]R.Seggelmann,M.Tuexen,andM.Williams.TransportLayerSecurity(TLS)andDatagramTransportLayerSecurity(DTLS)HeartbeatExtension,Feb.2012.IETFRFC-6520.[31]N.Sullivan.TheHeartbleedAftermath:allCloudFlarecerti\fcatesrevokedandreissued,2014.http://blog.cloudflare.com/the-heartbleed-aftermath-all-cloudflare-certificates-revoked-and-reissued[32]N.Sullivan.TheResultsoftheCloudFlareChallenge,2014.http://blog.cloudflare.com/the-results-of-the-cloudflare-challenge[33]TheGnuTLSTransportLayerSecurityLibrary.http://www.gnutls.org[34]E.Topalovic,B.Saeta,L.-S.Huang,C.Jackson,andD.Boneh.Towardshort-livedcerti\fcates.InWeb2.0Security&Privacy(W2SP),2012.[35]S.Yilek,E.Rescorla,H.Shacham,B.Enright,andS.Savage.Whenprivatekeysarepublic:Resultsfromthe2008DebianOpenSSLvulnerability.InACMInternetMeasurementConference(IMC),2009.[36]P.Zheng.Tradeosincerti\fcaterevocationschemes.InACMComputerCommunicationReview(CCR)2013.[37]ZMapVulnerableHosts.https://zmap.io/heartbleed/vulnerable.html 502 mainpotentiallyvulnerabletomaliciousthirdpartiesusingstolenkeystomasqueradeasacompromisedsiteforalongtimetocome.WeanalyzedthesetrendswithvulnerableEVcerti\fcates,aswell,andhavefoundthat,whiletheyex-hibitbettersecuritypractices,theystillremainlargelynotreissued(67%)andnotrevoked(88%)evenweeksafterthevulnerabilitywasmadepublic.Tothebestofourknowledge,ourfocusedstudyoncer-ti\fcatereissuesandrevocationsisthe\frstofitskind.Ourresultsare,insomeways,inlinewithpreviousstudiesontheratesatwhichadministratorspatchedvulnerablesoftware|forinstance,revocationratesfollowedasharpexponentialdrop-oshortlyafterthevulnerabilitywasmadepublic,andtaperedorelativelysoonthereafter.However,unlikewithsoftwarepatches,we\fndthevastmajorityofcerti\fcateshavestillnotbeenreissuedorrevoked.These\fndingsin-dicatequitesimplythatthecurrentpracticesofcerti\fcatemanagementaremisalignedwithwhatisnecessarytoensureasecurePKI.Surveyingsystemadministrators.Tohelpbetterun-derstandthereasonsbehindthelackofpromptcerti\fcatereissuesandrevocations,weinformallysurveyedafewsys-temsadministrators.WeaskedwhatstepstheyhadtakeninresponsetoHeartbleed:didtheypatch,reissue,andre-voke,andifnot,thenwhynot?Wereceivedsevenresponses.Mostreportedpatchingtheirsystems,typicallyindirectre-sponse,butsomereliedonmanagedserversorautomaticup-datesandthereforetooknoHeartbleed-speci\fcsteps.Therewassomevarianceinwhenpatcheswereapplied,duetoacombinationofscheduledrebootsanddelayedresponsesfromsomevendors,butthemajorityofpatcheswereap-pliedquickly.Forrevokingandreissuing,however,wesawawidespec-trumofbehavior.Fewbothrevokedandreissued,butamongthem,theydidsowithin48hours.Manyneitherrevokednorreissued;acommonreasonprovidedwasthatthevulnerablehostswereeithernothostingsensitivedataorwerenotrunningservicesthatweredeemedsensitiveenoughtowarrantit.Alongsimilarreasons,othersreportedhavingreissuedthecerti\fcatebutnotrevoking,explainingthatthecerti\fcateisonlyforinternaluse.Finally,othersreportedthattheydidnotperceivereissuingandrevokingasimpor-tantbecausetheyhadpatchedquicklyafterthebugwaspubliclyannounced(recall,however,thatthevulnerabilitywasintroducedovertwoyearsprior).Ourresultsfromthissmallsurveyshouldbeviewedanecdotally|amoreextensivesurveyoncerti\fcateadmin-istrationisaninterestingareaoffuturework|buttheydoshedlightonsomeoftherootcausesofwhyrevokingandreissuingarenotonequalfootingwithpatching.Whilead-ministratorsalmostuniversallyunderstandtheimportanceofpatchingafteravulnerability,manydonotappreciateorknowabouttheimportanceofrevokingandreissuingcer-ti\fcateswithnewkeys.Ofthoseadministratorswhodoun-derstandtheimportance,evensomeofthemreportedpush-backfromotherswhoperceivedtheprocessasbeingoverlycomplex.Insum,thispointstotheneedforbroadered-ucationonthetreatmentofcerti\fcates,andperhapsmoreassistancefromCAstohelpensurethatalltheprescribedstepsaretaken.Lessonslearned.OurresultssuggestseveralchangestocommonPKIpracticesthatmayimprovesecurityinprac-tice.First,thepracticesoflowrevocationratesandlongexpirationdatesformadangerouscombination.Techniquesthatautomaterevocationwouldvastlyreducetheperiodduringwhichclientsarevulnerabletomaliciousthirdpar-ties.Similarly,settingreasonablyshortcerti\fcateexpira-tiondates(assuggestedbyTopalovicetal.[34])bydefaultwillsigni\fcantlyreducetheperiodduringwhichvulnera-blecerti\fcatesarevalid.Second,mechanismsthatenableasimultaneousreissue-and-revokeforacerti\fcatewillmakeitlesslikelythatinvalidcerti\fcatesareacceptedbyclients.Third,wehavefoundthatmanydomains,whentheyreissueacerti\fcate,continuetooertheold,vulnerablecerti\fcate,aswell.Giventhelargenumberofcerti\fcatesandhostsusingthemperdomaininourdataset,webelieveadminis-tratorswouldbene\ftfromtoolsthatmoreeasilytrackandvalidatethesetofcerti\fcatestheyareusing.Futurework.Thispaperis,webelieve,the\frststepto-wardsunderstandingthemanualprocessofreissuingandrevokingcerti\fcatesinthewakeofavulnerability.Severalinterestingopenproblemsremain.BecauseourdatafocusesontheserverandCAsideofthePKIecosystem,weareunabletodrawanydirectconclusionsastowhatclientsexperience.Ahost-centeredmeasurementstudywould,forinstance,allowustounderstandnotonlywhenrevocationswereaddedtoCRLs,butwhenclientsactuallyreceivedtheCRLs.Moreover,ourstudyopensmanyquestionsastowhythecerti\fcatereissueandrevocationprocessesaresoexten-sivelymismanaged.Ourresultsreinforceprevious\fndingsthatsitepopularityiscorrelatedwithgoodsecurityprac-tices,buteventhehighestrankedAlexawebsitesshowrela-tivelyanemicratesofreissuesandrevocations.Understand-ingtherootcausesisanimportantsteptowardsdevelopingsecureinfrastructuresthateectivelyincorporate(ormiti-gate)theend-useradministrators.Opensource.Ouranalysisreliedonbothexisting,publicsourcesofdataandthosewecollectedourselves.Wemakeallofourdataandouranalysiscodeavailabletotheresearchcommunityathttps://ssl-research.ccs.neu.eduAcknowledgmentsWethanktheanonymousreviewersandourshepherd,Je-lenaMirkovic,fortheirhelpfulcomments.WealsothankRapid7forcollectingtheSSLcerti\fcatedata,theauthorsofZMapforcollectingtheHeartbleedvulnerabilitydata,andformakingitpubliclyavailable.Finally,wethankoursurveyrespondentsfortheircandidresponses.ThisresearchwassupportedinpartbyNSFgrantsCNS-1054233,CNS-1319019,andCNS-1150177,andanAmazonWebServicesinEducationgrant.7.REFERENCES[1]D.E.3rd.TransportLayerSecurity(TLS)Extensions:ExtensionDe\fnitions,Jan.2011.IETFRFC-6066.[2]AlexaTop1MillionDomains.http://s3.amazonaws.com/alexa-static/top-1m.csv.zip[3]E.Barker,W.Barker,W.Burr,W.Polk,andM.Smid.RecommendationforKeyManagement{Part1:General(Revision3),2012.NISTSpecialPublication800-57. 501 curve0+0830,whilethe\Notrevoked(EV)"line\ftsthecurve0+0Overall,EVcerti\fcatesfollowsimilartrendstotheen-tirecorpus,withaslightlyfasterandmorethoroughre-sponse.Interestingly,whileEVcerti\fcateswererevokedmorequickly,theirnon-EVcounterpartscaughtupwithintendays;however,EVcerti\fcateswerereissuedbothmorequicklyandmorethoroughly.Weexpectthattheunder-lyingcauseofthisobservationisaself-selectioneect,i.e.,security-conscioussitesaremorelikelytoseekoutEVcer-ti\fcatesinthe\frstplace.Wedoubtthattheadditionalidentityveri\fcationstepsrequiredtoobtainanEVcerti\f-cateplayalargeroleinthis(slightly)improvedreactiontoHeartbleed.Nonetheless,therearestillmanyvulnerableEVcerti\fcatesthathavenotbeenreissuedtwoweeksaftertheevent(67%)andthathavenotbeenrevokedthreeweeksafter(87%).5.RELATEDWORKOurworkliesattheintersectionoftwogeneralareasofpriorwork:studiesofhoweectivelyadministratorsreacttowidelypublicizedvulnerabilities,andmeasurementsoftheTLS/SSLcerti\fcateecosystem.Tothebestofourknowl-edge,wearethe\frsttolookspeci\fcallyathowpotentiallycompromisedcerti\fcatesarereplacedandrevoked.Vulnerabilitypatching.Therehavebeenseveralstud-iesofhowquicklyandeectivelyadministratorspatchwell-knownsoftwarevulnerabilities.Rescorlameasuredtheresponsetoa2002buerover\rowvulnerabilityinOpenSSL[27],andRamosinvestigatedhowthefractionofvulnerablesystemschangesaftervarioussecurityholesfrom2000{2005hadbeenpublished[25].Bothofthesestudiesfoundanexponentialdecreaseinthefractionofvulnera-blehostsshortlyafterpublicrevelationofthevulnerability,followedbyagradualdeclinethereafter.Interestingly,inRescorla'sstudy,anothersharpdeclineinthenumberofvulnerablehostsoccurredafterthereleaseoftheSlapperwormwhichexploitedthebuerover\row.CloselyrelatedtoourstudyisthatofYileketal.,whomeasuredtheaftermathofa2008vulnerabilityinDebian'sOpenSSLkeygenerationthatresultedinpredictableRSAkeys[35].Whatmakesthisworkparticularlyrelatedtooursisthat\fxingthevulnerabilityrequirednotonlypatch-ingOpenSSL,butalsoreissuingnewkeys.Theyfoundthatthisprocessresultedinagradualdeclineinthefractionofvulnerablehosts,asopposedtothesharpexponentialdecaywhenonlypatchingthesoftwareisnecessary.However,be-causetheirdatacollectiononlybeganseveraldaysafterthevulnerabilitywasreleased,thesharpdeclinemayhaveoc-curredbutgoneunnoticed.OurdatacoversmonthsleadinguptoandweeksafterHeartbleed,allowingusmorecon\f-denceintheinitialdrop-oofvulnerabilities.Ourworkbroadlybuildsonthesepriorstudiesinthatwefocusonadierent,thoughequallyimportant,aspectofthevulnerability\fxingcycle:whenpotentiallycompro-misedcerti\fcateswerenotonlyreplaced,butexplicitlyre-voked.Theconnectionbetweenpatchingsoftware,reissuingnewcerti\fcates,andrevokingoldoneshas,tothebestofourknowledge,notbeenexplicitlystudied.Thoughithadbeenpreviouslybelievedthatrevocationsandreissuesoccursimultaneously[8],ourresultsdemonstratethatrevocationsareoftenosetintime,orsimplyneveroccuratall.Thecerti\fcateecosystem.Infocusingonvulnerabil-ity\fxingasitpertainstocerti\fcates,ourworkisalsore-latedtorecentstudiesofthecerti\fcateecosystematlarge.Holzetal.[17]performedpassiveandactivemeasurementsonHTTPScerti\fcatesfromtheAlexaTop-1Mdomains.Durumericetal.[8]performedactivemeasurementsusingZMap[10]thatyieldednearly40morecerti\fcatesthanpriorstudies[11,16,17].Broadly,thesestudiesexposedsev-eralgrimpropertiesoftoday'scerti\fcateecosystem,includ-ingweakerkeylengthsthansuggestedbyNIST[3],longercerti\fcatechainsthannecessary,invalidsubjectnames,andsoon.Comparingthesestudiestooneanother,itappearsthattheAlexaTop-1Msites|thoughstillfarfromperfect|domanagecerti\fcatesmoreappropriatelyonaverage,withaslightweighttohigher-rankeddomains.LikeHolzetal.,ourworkfocusessolelyontheAlexaTop-1M;weexpectthatexpandingtomoredomainswould,asDurumericetal.found[8],resultinlesseectivecerti\fcatemanagement,thoughthisisanareaoffuturework.Whilethesestudieshaveshedconsiderablelightonthecerti\fcateecosystem(andfoundittobesurprisinglybleak),ourstudyisthe\frsttoexplicitlyconsiderreissuesandre-vocations,particularlyinthewakeofawidespreadvulner-ability.Durumericetal.[8]brie\ryinvestigatedcerti\fcaterevocations,andfoundthatamere2.5%ofthecerti\fcatestheyencounteredwereeverrevoked|ofthese,themajoritygavenoreasoncode.ByusingHeartbleedasawide-scalecorrelatedevent,wecomplementthispriorworkbyinvesti-gatingwhichcerti\fcatesshouldhavebeenrevoked,andwhentherevocationsshouldhavetakenplace.Inthecontextofthecerti\fcateecosystem,webelievethistobenovel.Heartbleed.TherecentnatureoftheHeartbleedvulnera-bilitymeanslittlescienti\fcworkhasyettocomeoutstudy-ingthevulnerabilityitselfandthecommunity'sreactiontoit.Themostcloselyrelatedwork|astudyperformedcon-currentlywithourown|presentsacomprehensivestudyofthebreadthofthevulnerability,theclean-up,andsurveysofadministratorswhofailedtopatchtheirservers[9].In-terestingly,thestudyleverageshistoricpackettraces[19]tolookforevidenceofHeartbleedexploitationbeforetheannouncementand\fndsnoevidencethatthevulnerabil-itywasexploitedbeforehand.Thisstudyandourownarecomplementary|theirsbrie\ryexaminesSSLcerti\fcatereis-suesandrevocations,andtheresultsoftheiranalysisareinagreementwithours.6.CONCLUDINGDISCUSSIONInthispaper,westudyhowSSLcerti\fcatesarereis-suedandrevokedinresponsetoawidespreadvulnerabil-ity,Heartbleed,thatenabledundetectablekeycompromise.Weconductedlarge-scalemeasurementsanddevelopednewmethodologiesandheuristicstodeterminehowthemostpopular1millionwebsitesreactedtothisvulnerabilityintermsofcerti\fcatemanagement,andhowthisimpactsse-curityforclientsthatusethem.Wefoundthatthevastmajorityofvulnerablecerti\fcateshavenotbeenreissued;further,ofthosedomainsthatreis-suedcerti\fcatesinresponsetoHeartbleed,60%donotre-voketheirvulnerablecerti\fcates|iftheydonoteventuallybecomerevoked,20%ofthosecerti\fcateswillremainvalid(notexpire)fortwoormoreyears.Therami\fcationsofthis\fndingsarealarming:modernWebbrowserswillre- 500 Figure17:CumulativedistributionofthetimebetweenwhenwedownloadedtheCRLs(6:00pmEST)andthetimeofissuerecordedintheCRL(andsignedbytheCA).MostCAshaveachancetorevokecerti\fcatesatleastonceaday,as95%oftheCAsupdatedtheirCRLswithin24hoursofwhenwedownloadedthem.duetoconcernsthattheprivatekeymayhavebeencompro-mised,thisincreaseisnotunexpected.However,itstillap-pearsthatvastmajorityofCRLentriesaremis-coded.PriorworkhasalsonotedthatCRLsareusuallymis-coded[8],al-thoughthesnapshotwepresentinFigure16isevenmorestark,giventhatweknowHeartbleed-inducedrevocationsshouldhavebeenrevokedwithareasoncodeof\KeyCom-promise".CRLupdateintervals.Thegenerallackofsiteadmin-istratorsrevokingcerti\fcateswhentheyshould(e.g.,afterHeartbleed)couldbeattributedtotheCAsonlyupdatingtheirCRLsonverylongtimescales.Forexample,onerea-sonforthiswouldbeifCAskepttheirprivatekeysonoinehoststhatwouldhavetobepoweredoneverytimetosignCRLs.AnotherreasonwouldbesoclientsdonotneedtodownloadnewCRLsveryoften.Figure17indicatesthatneitherofthesereasonsaretrue.This\fgureshowsthecumulativedistributionofthedier-encebetweenthetimewedownloadedaCRLandthetimeitwasissued.Weseethat95%ofCAssignedafreshCRLwithin24hoursof6:00pmEST(whenwedownloadedtheCRLs).WhenCAssignafreshCRL,theyhavetheopportu-nitytorevokemorecerti\fcates.TheseresultssuggestthatCAscouldrevokecerti\fcatesasoftenaseveryfewhours.Thus,anydelaysintherevocationofcerti\fcatesareduetohumansintheloop:eithercerti\fcateownerswhoarenotre-portingpotentiallycompromisedkeys,orCApersonnelwhoarenotmanuallyaddingnewentriestoCRLsbeforetheyaresignedandshipped.Anotherimportantfactorinthecontextofclientimpactiswhen(andwhether)clientsobtainedthelistofrevocations.Unfortunately,weareunabletoanswerthisquestiongivenourdatacollectionmethodology(itwouldrequireinstru-mentingend-hoststoseewhenpreciselytheirbrowsersandoperatingsystemsfetchedCRLsorissuedOCSPqueries).Suchastudyisaninterestingareaoffuturework.However,thereisoneaspectofthisproblemtowhichwemaybeabletolendinsight;itwasrecentlyreportedthatmanybrowsersdonotevenbothertocheckcerti\fcates'CRLs,withtheexceptionofextendedvalidation(EV)certi\fcates[7].WenextturntoananalysisofhowtheseEVcerti\fcatesarereissuedandrevokedincomparisontotheentirecorpusofcerti\fcates. Figure18:Therateatwhichvulnerablecerti\fcateswerereissuedandrevokedafterHeartbleed'sannouncement.(Notethatthe-axisdoesnotbeginatzero.)4.5ExtendedValidationCerticatesRecallthatoneofthemajorrolesofaCAistovalidatetheidentityofthesubjectsforwhomitissuescerti\fcates.ExtendedValidation(EV)certi\fcatesareameansbywhichCAscanexpressthatthisidentity-veri\fcationprocesshasfollowedasetof(presumablystringent)establishedcriteria.EVcerti\fcatesarestandardX.509certi\fcates,andoernoadditionalsecurityperse,buttherationaleisthatwithamorethoroughveri\fcationprocessbytheCAs,thesecer-ti\fcatescanbemorereadilyveri\fedandtrustedbyusers.Thatsaid,thereremainsconcernastowhetherornotthistrustiswell-placed.WeclosethissectionbyinvestigatingtherateatwhichvulnerableEVcerti\fcateswererevokedandreissuedascomparedtotheentireaggregateofcerti\f-cates.Figure18showsthefractionofvulnerablecerti\fcatesthathaveyettobereissuedorrevokedovertime.Inthis\fgure,theinitialvaluesdonotallstartat1.0forreissues:thisisbecause,withcoarsegranularityofourdata,wecannotbecertainwhethersomecerti\fcateswerereissuedimmediatelyafterthescanonApril7,2014,immediatelybeforethescanonApril10,2014,orinbetween.Wethereforeprovidethemostoptimisticpossibility:ifweknowacerti\fcatewasreis-suedbetweendaysand,thenweplotitashavingbeenreissuedonday.ThecoarsegranularityofthescansalsoexplainswhythereissuelinesdonotadvancebeyondApril21.Regardless,onetrendthatremainsclearisthatsitesaremoreproactiveinreissuingnewcerti\fcatesthaninrevokingoldones.Thiscontradictspriorassumptionsthatrevoca-tionsandreissuesoccursimultaneously[8].Indeed,itisnotyetcleartouswhyasitewouldreissueavulnerablecerti\f-catewithoutrevokingit,butthesetrendsdemonstratethatitisacommonpractice,evenforthosewithEVcerti\fcates.This\fgureshowsagenerallybleakviewofhowthoroughlysitesrevokeandreissuetheircerti\fcateswhennecessary.Notethatthe-axisbeginsat0.65:threeweeksaftertherevelationofHeartbleed,over87%ofallcerti\fcateswefoundtobevulnerablehaveyettoberevoked,andover73%ofthemhaveyettobereissued.Ofthosethatdidrevoketheircerti\fcates,we\fndthatthespeedatwhichtheydidsomatchesthatofearlierstudiesonthespreadofpatches[25,27]:thereisanexponentialdrop-o,followedbyagradualdecline.Speci\fcally,the\Notrevoked(all)"line\ftsthe ManybrowserspresentEVcerti\fcateswithagreenboxintheaddressbar,whilenon-EVcerti\fcatesareoftenjustrepresentedwithagraylockicon. 499 Figure14:Cumulativedistributionofthenumberofdaysbetweenwhenacerti\fcateisreissuedandwhenitisrevoked.Positivevaluesindicatethecerti\fcateisreissuedbeforeitisrevoked;negativevaluesindicatetheopposite.sues,i.e.,siteswithhighrankareslightlymorelikelytorevoke.Ideally,thetwolinesinFigure10shouldbecoin-cident,i.e.,allsitesreissuingcerti\fcatesduetoHeartbleedshouldalsohaverevokedtheretiredcerti\fcates(theonlyexceptiontothisruleisiftheretiredcerti\fcatewasabouttoexpireanyway,butweaccountforthisinourde\fnitionsofHeartbleed-inducedreissuesandrevocations).Thisresulthighlightsaseriousgapinsecuritybest-practicesacrossallofthesitesintheAlexaTop-1M.Finally,weexaminetherevocationspeed,orthenumberofdaysbetweenwhenacerti\fcateisreissuedanditisrevoked.Figure14presentsthecumulativedistributionoftherevoca-tionspeedforbothHeartbleed-inducedandnon-Heartbleed-inducedrevocations.Tomakethedistributionscomparable,weonlylookatdierencesbetween-10and10days(recallthatHeartbleed-inducedreissuesandrevocationscanonlyoccurafterApril7,2014,limitingthatdistribution).Weob-servethatHeartbleed-inducedrevocationsappeartohappenslightlymorequickly,thoughtnottotheextentonemightexpect,giventheurgentnatureofthevulnerability.Wealsoobservethatrevocationalmostalwayshappensafterreissue,whichislikelyexplainedbythemoremanualprocessthatrevocationoftenentails.Thisresultcontradictspreviousassumptions[8]thatrevocationsandreissuesoccursimulta-neously.Finally,itisworthnotingthatthegranularityofourscansmakesgeneralizingtheseresultsdicult,sincewecannottellexactlywhenacerti\fcatewasreissued;however,thetwodistributionsarecomparabletoeachother.Expirationsarenotenough.Todemonstratehowlongtheeectsofthisvulnerabilitycouldbefeltifsitesdonotrevoketheirvulnerablecerti\fcates,weanalyzecerti\fcatesthat,bytheendofourdatacollection,werefoundtobevulnerable(andalive)whenHeartbleedwasannounced,reis-suedthereafter,butneverrevoked.Figure15presentsthedistributionofhowmuchlongersuchcerti\fcateswillcon-tinuetoliveiftheirsitesdonotrevokethem.NotethatthisCDFappearstobepiecewiselinearatintervalsof1year:thisisbecauseexpirationdatesaretypicallysetatintervalsofayear|thatthedistributionisroughlyuni-formwithintheseyearintervalsindicatesthatcerti\fcatesareissuedmostlyuniformlythroughouttheyear.This\fgureshowsthat,withoutrevoking,thevulnerabilityintroducedin2014couldaectclientsthrough2020.Weconcludefromthisthat,giventhemeagerratesofrevocation,itwouldbehelpfulforCAstoshifttoshorterexpirytimesintheircer-ti\fcates. Figure15:Thedistributionoftime-until-expiryforvul-nerable,reissued,butnotrevokedcerti\fcates.Ifthesecer-ti\fcatesareneverrevoked,this\fgureshowshowlongtheywillpersist.CRLreasoncodes.TheCRLspeci\fcationallowsthemaintainersofCRLstoincludeareasonforwhyacerti\fcatewasrevokedalongwiththerevocationintheformofasmallsetofreasoncodes.Thereasoncodeisoptional,andtheoptionsrangefrom\Unspeci\fed"to\KeyCompromised"to\PrivilegeWithdrawn"[6].NotethattheCRLreasoncodesarenotnecessarilyveri\fedbythecerti\fcateauthorities,andtheymaybeincorrect.Forallofthecerti\fcatesthatweobservedtoberevoked,weextractedthereasoncode(ifoneexisted);wepresentthedistributionofthesereasoncodesforbothHeartbleed-inducedandnon-Heartbleed-inducedcerti\fcatereissuesinFigure16.Notethelog-scaleonthe-axis.Wemaketwokeyobservations.First,weseeasigni\f-cantincreaseintheprobabilityofareasoncodebeingpro-videdatallforHeartbleed-inducedrevocations:only19.2%ofnon-Heartbleed-inducedrevocationsprovideanyreasoncode(includingthe\Unspeci\fed"reasoncode),while27.1%onHeartbleed-inducedrevocationsprovideareasoncode.Second,weobservealargeincreaseinthe\KeyCompro-mise"reasoncode(from0.40%to1.18%ofallCRLentries);giventhatHeartbleedcerti\fcatesarelikelybeingreissued Figure16:DistributionofCRLreasoncodesgivenforbothHeartbleed-inducedandnon-Heartbleed-inducedcer-ti\fcatereissues.Notethelogscaleonthe-axis.Weob-serveanincreaseinreasonsforrevocationsbeinggivenforHeartbleed-inducedreissues,especiallyforthe\KeyCom-promised"reasoncode. 498 Figure12:Numberofdomainsthatrevokedatleastonecerti\fcateovertimeforthemonthbeforeandafterHeart-bleed.atleastpartiallyduetosystemadministratorsre-usingthesameCerti\fcateSigningRequest(CSR)whenrequestingthenewcerti\fcatefromtheirCA.InthewakeofHeartbleed,weobserveasigni\fcantdropinthefrequencyofreissuingcerti\fcateswiththesamekey;thisresultindicatesthatsitesaregeneratinganewkeypairmorefrequently.However,ifwefocusontheHeartbleed-inducedreissues,weobservethatanon-trivialfraction(4.1%)ofthesecerti\fcatesarereissuedwiththesamekey(therebydefeatingthepurposeofreissuingthecerti\fcate).Infact,weobserveatotalof912suchcerti\fcatescomingfrom747distinctAlexadomains.4.4CerticateRevocationWenowturntoinvestigatingcerti\fcaterevocationbefore,during,andaftertherevelationofHeartbleed.Recallthatitiscriticalthatavulnerablecerti\fcateberevoked:evenifasitereissuesanewcerti\fcate,ifanattackergainedaccesstothevulnerablecerti\fcate'sprivatekey,thenthatattackerwillbeabletoimpersonatetheowneruntileitherthecerti\f-cateexpiresorisrevoked.Westudybothrevocationandexpirationhere,andcorrelatethemwithratesofreissue.Contrarytostandardassumptions,we\fndthatrevocationandreissuesdonothappensimultaneously.Overallrevocationrates.Figure5showsthenumberofcerti\fcaterevocationsovertime;asnotedabove,theav-eragejumpsfrom29certi\fcatesrevokedperdayto1,414post-Heartbleed.However,thespikeonApril16,2014issomewhatmisleading,asitwaslargelyduetothemass-revocationof19,384CloudFlarecerti\fcatesoftheformss-lXXXXX.cloudflare.com[31].Tomitigatethisissue,weplotinFigure12thenumberofuniquedomainsthatrevokedatleastonecerti\fcateovertime.Wemakethreeinterestingobservations:First,themagnitudeoftheHeartbleed-inducedspikeisgreatlyre-duced,butwestillobserveanup-to-40-foldincreaseinthenumberofdomainsissuingrevocationsperday.Second,weobservethatthenumberofdomainsissuingrevocationsfallsclosertoitspre-HeartbleedlevelbyApril28th,suggestingthatmostofthedomainsthatwillrevoketheircerti\fcateindirectresponsetoHeartbleedalreadyhave. Wenotethatrevocationaloneisofteninsucienttopre-ventimpersonation,asanattackermaybeabletopreventtheclientfromaccessingtheCRL.Inthiscase,manywebbrowsersstillacceptthecerti\fcateasvalid[18]. Figure13:Fractionofreissuedcerti\fcatesthatarerevokedwithintwoweeksofbeingretired.Asigni\fcantincreaseinrevocationprobabilityisobservedafterHeartbleed.Third,weobservethree\dips"inthepost-Heartbleedre-vocationrateonApril13th,April20th,andApril27th|allweekends,indicatingthatfarfewerrevocationsoccurontheweekendrelativetotherestoftheweek.Thisperiodicitycanalsobe(less-easily)observedinthepre-Heartbleedtimeframe.Itisreasonabletoassumerevocationsdiponweek-endsbecausehumansareinvolvedintherevocationprocess,howeveritisnotclearwhoisresponsibleforthedelays:isitsiteadministratorsorCRLmaintainersatCAs(orboth)whoarenotworkingonweekends?Regardlessofwhoisre-sponsible,theseweekenddelaysareproblematicforonlinesecurity,sincevulnerabilities(andtheattackerswhoexploitthem)donottakeweekendso.Revocationofreissuedcerti\fcates.Wenowexaminethefractionofretiredcerti\fcates(i.e.,oldcerti\fcatesthathavebeensupersededbyareissuedcert)thatarerevokedwithintwoweeksofbeingretired.Figure13plotsthisfrac-tionovertime.Forexample,thepointonMarch3,2014showsthat2.2%ofthecerti\fcatesretiredonthatdaywererevokedbyMarch17,2014.Overall,weseethatbetween2%and3%ofcerti\fcatesbeingretiredareeventuallyre-voked.ThisprobabilityincreasesbyanorderofmagnitudeafterHeartbleed,withalmost40%ofretiredcerti\fcatesbe-ingrevokedquicklyafterwards.Thisresultsuggeststhatthereasonmanycerti\fcateswerereissuedjustafterApril7wasbecauseofHeartbleed,sincetheretiredcerti\fcateswerealsorevoked.Thiscontrastswithcerti\fcatesthatarereis-suedduetoimpendingexpiration,inwhichcasetheretiredcerti\fcatedoesnotneedtoberevoked.Heartbleed-inducedrevocations.Similartocerti\fcatereissues,notallcerti\fcaterevocationsafterApril7,2014arenecessarilyduetoHeartbleed(e.g.,thesitecouldhaveexposedtheirprivatekeyduetoadierentvulnerability).Wethereforede\fneaHeartbleed-inducedrevocationtobeacerti\fcaterevocationwherethecerti\fcatehadaHeartbleed-inducedreissue(see4.3).Overall,weobserve14,726Heartbleed-inducedrevoca-tions;thiscorrespondsto40%ofallHeartbleed-inducedreissuedcerti\fcates.Thus,60%ofallcerti\fcatesthatwerereissuedduetoHeartbleedwerenotrevoked,implyingthat,ifthecerti\fcate'sprivatekeywasactuallystolen,theat-tackerwouldbeabletoimpersonatethevictimwithoutanyclientsbeingabletodetectit.Figure10presentsthefractionofsitesthathaveatleastoneHeartbleed-inducedcerti\fcaterevocation,asafunctionofAlexarank.Revocationsfollowasimilartrendtoreis- 497 Figure9:NumberofHeartbleed-inducedandnon-Heartbleed-inducedcerti\fcatereissuesovertime.3.Wedonotobservemorethantwootherreissuesforcerti\fcateswiththatCommonNameinthetimebe-foreHeartbleed.Thisimpliesthatcerti\fcateswiththatnamedonottypicallygetreissuedmorethanonceevery3months(asfaraswecanobservefromourdataset),asourdatasetbeginsonOctober30,2013(slightlyover5monthsbeforetheannouncementoftheHeartbleedvulnerability).Thus,fortheexamplesshownsofar,wewouldnothaveconsideredthereissueoftheretiredcerti\fcateinFigure4tobeHeartbleed-induced(asithappenedbeforeHeartbleed),andwewouldalsohavenotconsideredanyofGoogle'sreis-suesinFigure8tobeHeartbleed-induced(becauseweob-servedatotalof12reissuesofcerti\fcateswiththatCom-monNamepriortoHeartbleed).ItisimportanttonotethatHeartbleed-inducedreissuescanhappenforcerti\fcatesthatweneverobservedonavulnerablehost,eitherbecausewefalselydeclaredthecerti\fcatetonotbevulnerable(see3.4)orbecausethesitereissuedoutofanabundanceofcaution,eventhoughtheywerenotactuallyvulnerable.Giventhesethreeconditions,weexpectthatourestimateofHeartbleed-inducedreissuesisastrictlowerboundHeartbleed-inducedreissues.Overall,weobserve36,781certi\fcatereissuesthatwedeclaretobeHeartbleed-inducedinthethreeweeksfollowingtheannouncement;thisis8.9%ofallcerti\fcatesthatwerealiveatthetimeHeart-bleedwasannounced.InFigure9,wepresentthenumberofHeartbleed-inducedandnon-Heartbleed-inducedcerti\f-catereissuesovertime.Weobservethatthenumberofnon-Heartbleed-inducedreissuesisrelativelystable|evenafterHeartbleed|suggestingourdesignationofHeartbleed-inducedreissuesislikelyaccurate.Theslightspikeinnon-Heartbleed-inducedreissuesafterApril7mayre\rectthatourapproachyieldsaconservativeunderestimateofthenumberofHeartbleed-inducedreissues.Next,weexaminethefractionofsitesthathaveatleastoneHeartbleed-inducedcerti\fcatereissue,asafunctionofAlexarank.Figure10presentstheseresults;wecanobserveastrongcorrelationwithAlexarank.Higher-rankedsitesaremuchmorelikelytohavereissuedatleastonecerti\fcateduetoHeartbleed(eventhoughtheyareonlyslightlymorelikelytohavebeenvulnerable,asobservedinFigure6).Thisresultcomplementspreviousstudies'\fndingsthatmorepopularwebsitesoftenexhibitmoresoundadministrativepractices[8,17].Vulnerablecerti\fcates.Next,weexaminethecerti\fcatesthatshouldhavebeenreissued(regardlessofwhetherthey Figure10:FractionofdomainsthathaveatleastoneHeartbleed-inducedreissue/revocationasafunctionofAlexarank.actuallywere);werefertothesecerti\fcatesasvulnerablecerti\fcates.Wedeclareacerti\fcatetobevulnerableifthefollowingthreeconditionshold:1.ItsdateofbirthwasbeforeApril7,2014,2.IthasnotexpiredasofApril30,and3.Itwasadvertisedbyatleastonehostthatwas(oris)vulnerabletoHeartbleed.Inotherwords,thesecerti\fcatesarevulnerablebecausetheirassociatedprivatekeyscouldhavebeenstolenbyat-tackers.Overall,we\fnd107,712vulnerablecerti\fcates.Ofthese,weobservethatonly28,652(26.7%)havebeenreissuedasofApril30.Theremaining79,060(73.3%)vulnerablecerti\f-catesthathavenotbeenreissuedcomefrom55,086dier-entAlexaTop-1Mdomains.Thus,thevastmajorityofSSLcerti\fcatesthatwerepotentiallyexposedbytheHeartbleedbugremainin-useoverthreeweeksafterthevulnerabilitywasannounced.Reissueswithsamekey.Systemadministratorswhobe-lievethattheirSSLprivatekeymayhavebeencompromisedshouldgenerateanewpublic/privatekeypairwhenreissu-ingtheircerti\fcate.Wenowexaminehowfrequentlythisisdone,bothinthecaseofnormalcerti\fcatereissuesandforHeartbleed-inducedreissues.We\frstobservethat,ingeneral,reissuingacerti\fcateusingthesamepublic/privatekeypairisquitecommon.Figure11presentsthefractionofallnewcerti\fcatesthatusethesamekeyastheonetheyarereplacing;upto53%ofallreissuedcerti\fcatesdoso.Thishighlevelofkeyreuseis Figure11:Fractionofnewcerti\fcatesthatusethesamepublic/privatekeypairasthekeytheyarereplacing. 496 Figure6:FractionofdomainsthathaveatleastonehostthatwasevervulnerabletoHeartbleedasafunctionofAlexarank,aswellasdomainsthatcontinuedtobevulnerableattheendofthestudy.InFigure5,wepresentthenumberofcerti\fcatebirths,deaths,reissues,andrevocationsperdayovertime.Thenumberofbirthsisalmostalwayslargerthanthenumberofdeaths,meaningthatthetotalnumberofcerti\fcatesin-the-wildisincreasingovertime.Furthermore,weobservealargespikeinallfoureventsinthewakeofHeartbleed,withanespeciallylargeincreaseinthenumberofrevocations.Forexample,weseeanaverageof29certi\fcaterevocationsperdaybeforeHeartbleed;afterHeartbleed,thisjumpstoanaverageof1,414revocationsperday.4.2HeartbleedPrevalenceWepresentabriefanalysisonthenumberofcerti\fcateshostedbymachinesthatwereevervulnerabletoHeartbleed.Ofthe428,552leafcerti\fcatesthatwerestillaliveonthelastscan,weobserve122,832(28.6%)ofthemadvertisedbyahostthatwaslikelyvulnerabletoHeartbleedatsomepointintime.Thesecerti\fcatesarefor117,112uniqueCommonNamesandcomefrom70,875uniqueAlexaTop-1Mdomains.Ofthesecerti\fcates,11,915certi\fcates(from10,366uniquedomains)wereonhoststhatwerestillvul-nerableatthetimeofourcrawl(April30,2014,overthreeweeksaftertheannouncementofHeartbleed).Thisresultdemonstratesthateveninthewakeofawell-publicized,se-veresecurityvulnerability,around10%ofvulnerablesiteshavenotyetaddressedtheunderlyingissuethreeweeksaf-terthefact.InFigure6,wepresentthefractionofdomainsthathaveatleastoneSSLhostthatwasevervulnerabletoHeart-bleed(orstillwasasofApril30,2014).Wecanobserveaslightincreaseinlikelihoodofeverbeingvulnerableforthemostpopularsites,butthedistributionquicklystabilizes.Again,theincreasedlikelihoodofbeingvulnerableislikelybecausethesesiteshavelargernumbersofhosts.ThistrendismirroredinthehoststhatarestillvulnerableonApril30,2014.4.3CerticateReissuesWenowexaminethereissuingofSSLcerti\fcatesinthewakeofHeartbleed.NotallSSLcerti\fcatereissuesthatweobservefollowingHeartbleed'sannouncementareduetotheHeartbleedvulnerability.Inparticular,reissuescanhappen Thisfractionissomewhathigherthanthe17%ofsitesthatNetcraftfoundtobevulnerable[22],butwenotethatwearemeasuringcerti\fcatesfromtheAlexaTop-1MwhileNetcraftismeasuringallSSL-enabledsitesontheInternet. Figure7:Cumulativedistributionofthenumberofdaysbeforeexpirationthatcerti\fcatesarereissued.foratleasttwootherreasons:First,theoldcerti\fcatecouldbeexpiringsoon,andtheorganizationreissuesthecerti\fcateasitwouldnormally.InFigure7,wepresentthecumulativedistributionofthenumberofdaysbeforeexpirythatweobservecerti\fcatesbeingreissued.Weseethatover50%ofcerti\fcatesarereissuedwithin60daysoftheirexpirydate(withalongtail).Second,asitemayperiodicallyreissuecerti\fcatesasamatterofpolicy(eveniftheoldcerti\fcatewasnotnearexpiration).Forexample,Figure8presentsagraphshowingtheprevalenceofthewww.google.comcerti\fcatesovertime,witheachlinerepresentingthenumberofhostsadvertisingadierentcerti\fcate.Googletypicallyreissuesthiscerti\fcateeverytwoweeks,despitethefactthatthecerti\fcatesaretypicallyvalidformorethanthreemonths.Inthisstudy,wewouldliketobeabletodistinguishHeartbleed-inducedcerti\fcatereissuefromareissuethatwouldotherwisehavehappenedanyway.Wede\fnethereis-sueofacerti\fcatetobeHeartbleed-inducedifallthreeofthefollowingconditionshold:1.ThedateofreissuewasonorafterApril7,2014(thedayHeartbleedwasannounced).WenotethatasmallnumberoforganizationswereinformedaboutHeart-bleedbeforethepublicannouncement;asthislistisnotfullyknown,wedonotconsiderthemseparately.2.Thecerti\fcatethatisreissuedwasgoingtoexpiremorethan60daysafterthereissue.Thiseliminatescerti\fcatesthatwereverylikelytobereissuedinthenearfutureanyway. Figure8:Exampleofcerti\fcatebirthanddeathforcer-ti\fcatesforwww.google.com.Googlereissuesthiscerti\fcateaboutonceeverytwoweeks(eachimpulserepresentsadif-ferentcerti\fcate). 495 Figure4:Exampleoflifetime,forcerti\fcatesform.scotrail.co.uk.Allhostsexceptoneswitchtoanewcerti\fcateafterFebruary10,2014.-DOPENSSL_NO_HEARTBEATSorwhodowngradedtheirOpenSSLimplementationtoversion0.9.8wouldhavetheirhostsincorrectly\raggedasneverhavingbeenvul-nerable.Wearesimilarlyunabletodeterminethefractionofhostsinourdatasetthatthisappliesto;wesuspectitissmallaswell,asmanyoperatingsystemsvendors(e.g.,Ubuntu)pushedoutaHeartbleedsecurityupdatethatisusuallyautomaticallyapplied.Veri\fcationofvulnerabilitydetection.WeperformedabriefexperimenttoestimatethefalsenegativerateofourHeartbleedvulnerabilitydetectionmechanism.WeuseavulnerabilityscanoftheAlexaTop-1MdomainsconductedbytheauthorsofZMap[37]onApril9,2014,whichcon-tainsalistofhoststheycon\frmedtobevulnerabletoHeart-bleed.InourscanonApril28,2014(19daysaftertheZMapscan),wefoundthat8,651ofthesehostswerestilladver-tisingacerti\fcatewiththesameCommonName.Ofthese,1,737(20.1%)werestillvulnerable;theremainderwerelikelypatchedinthemeantime.Usingour\fngerprintingmethod-ologyabove,wewouldhaveinferredthat8,483(98.1%)ofthehostswererunningaversionofOpenSSLthatwasvul-nerableatsomepoint(despitethefactthatthemajorityofthesewereactuallynolongervulnerable).Thishighrateofrecall,coupledwiththeunlikelihoodoffalsenegatives,leadsustoconcludethatourmethodologyforinferringpreviousvulnerabilityishighlyaccurate.4.ANALYSISWenowturntoexaminethecollectedSSLcerti\fcatedata.We\frstpresentafewde\fnitionsweuseintheanalysisbe-foreproceeding.4.1DenitionsWeareconcernedwiththeevolutionofSSLcerti\fcates(i.e.,whenarenewcerti\fcatescreated,oldonesretired,etc.).Toaidinunderstandingthisevolution,wede\fnethefollowingnotions:Certi\fcatebirth:Wede\fnethebirthofanSSLcerti\f-catetobethedateofthe\frstscanwhereweobservedanyhostadvertisingthatcerti\fcate.Forhoststhatweobservedadvertisingacerti\fcateonthevery\frstscan(October30,2013),wede\fnethesecerti\fcatestohavenobirthdate,sincewedonotknowwhentheywere\frstadvertised. Ofcourse,somecerti\fcatesmayhavebeenmissedonthe\frstscanifthehostwasdown;thesecerti\fcateswouldlikely Figure5:Numberofcerti\fcatebirth,deaths,reissues,andrevocationsovertime.Notethelogscaleonthe-axis.Certi\fcatedeath:De\fningthedeathofacerti\fcateismorecomplicated,asweobserveanumberofinstanceswheremanyhostsadvertiseagivencerti\fcate,andthenallbutoneorafewofthehostsswitchovertoanewcerti\fcate(presumably,thesiteintendedtoretiretheoldcerti\fcate,butmissedsomeofthehosts).Tohandlethesecases,wecalculatethemaximumnumberofhoststhatwereeverad-vertisingeachcerti\fcate.Wethende\fnethedeathofanSSLcerti\fcatetobethelastdatethatthenumberofhostsadvertisingthecerti\fcatewasabove10%ofthatcerti\fcate'smaximum.The10%thresholdpreventsusfromincorrectlyclassifyingcerti\fcatesthatarestillwidelyavailableasdead,evenifthecerti\fcatehasbeenreissued.Notethatcerti\f-catesmaynothaveadeathdateifthecerti\fcateisstilladvertisedbymanyIPaddressesonourlastscan.Anexampleofcerti\fcatelifetimeisshowninFigure4,forthecerti\fcatesform.scotrail.co.uk.Allhostsexceptoneswitchtoanewcerti\fcateafterFebruary10,2014;thislonehost\fnallyswitchesonApril28,2014.Inthiscase,wewouldconsiderthedeathdateoftheoldcerti\fcatetobeFebruary10,2014(asindicatedinthe\fgure),andwewouldconsiderthenewcerti\fcatetohavenodeathdate.Basedonthesede\fnitions,wecannowde\fnethenotionofacerti\fcatereissueandrevocation:Certi\fcatereissue:Weconsideracerti\fcatetobereissuedifthefollowingthreeconditionshold:(a)weobservethecerti\fcatedie,and(b)weobserveanewcerti\fcateforthesameCommonNamebornduringascanwithin10daysofthecerti\fcate'sdeath,and(c)weobserveatleastoneIPaddressswitchfromtheoldcerti\fcatetothenewbetweenthetwoscans.Wede\fnethedateofthecerti\fcatereissuetobethedateofthecerti\fcate'sdeath.Forthesakeofclarity,werefertotheoldcerti\fcatethatwasreplacedastheretiredcerti\fcateCerti\fcaterevocation:Weconsideracerti\fcatetobere-vokedifthecerti\fcate'sserialnumberappearsinanyofthecerti\fcate'sCRLs.ThedateofrevocationisprovidedintheCRLentry. showupinthesecondscan(andwouldhaveabirthdateofthenextscan).ThisisthecauseofthesmallspikeinbirthsonNovember2,2013inFigure5.Wechoose10daysasathresholdasthisisthemaximumdierencebetweentwosuccessivescans. 494 Figure2:Fractionofnewcerti\fcatesthatwecouldver-ifyforprovided(February5,2014andbefore)andrecon-structed(postFebruary5,2014)chains.certi\fcateshasavalidchain;werefertothecollectionofallCAcerti\fcatesonthesechains(notincludingtheleafcerti\fcates)astheCASet;theCASetcontains910uniquecerti\fcates.TheLeafSetcerti\fcatescover166,124(16.6%)oftheAlexaTop-1Mdomains.Thisisthesetofcerti\fcates(andcerti\fcatechains)thatweuseintheremainderofthepaper.Validationofreconstruction.Finally,webrie\ryvalidateourcerti\fcatechainreconstructionmechanismonthepost-February5,2014certi\fcates.InFigure2,wepresentthefractionofnewcerti\fcatesdiscoveredovertimeforwhichwewereableto\fndavalidchain,bothforthepre-andpost-February5,2014data.Wemaketwointerestingobserva-tions:First,thefractionofcerti\fcatesthatwecouldvalidateisrelativelystableat2%bothbeforeandaftertheswitchtousingreconstructedchains,suggestingthatourmechanismforchainreconstructiondoesnotmissmanychains.Sec-ond,weseealargeuptickinthefractionofnewly-appearingcerti\fcatesthatwecouldvalidateafterHeartbleed;aswediscussinthefollowingsection,thisisduetomanycerti\f-catesbeingreissuedinthewakeofHeartbleed.3.3CollectingCRLsTodetermineifandwhencerti\fcateswererevoked,weextractedtheCRLURLsoutofallLeafSetcerti\fcates.WeignoredinvalidURLs,includingldap://protocolsandnon-routableaddresses.Wefound626,659(99.7%)ofthesecer-ti\fcatestoincludeatleastonewell-formed,reachableCRLURL;forcerti\fcatesthatincludedmultipleCRLURLs,weincludedthemall.Wefoundatotalof1,386uniqueCRLURLs(mostcerti\fcatesuseauni\fedCRLprovidedbythesigningCA,sothesmallnumberofCRLsisnotsurprising).WedownloadedalloftheseCRLsonMay6,2014,andfound45,268(7.2%)oftheLeafSetcerti\fcatestoberevoked.WealsocollectedtheCRLURLsforallcerti\fcatesintheCAset.Wefoundthat884(97.1%)ofthecerti\fcatesintheCASetincludedareachableCRL;theunionoftheseURLscomprised246uniquereachableURLs.Wedown-loadedtheseCRLsonMay6,2014,aswell.WefoundatotalofsevenCAcerti\fcatesthatwererevoked,whichnul-li\fedthevalidityof60certi\fcatesintheLeafSet(01%).3.4InferringHeartbleedVulnerabilityFinally,wewishtodetermineifasitewasevervulnerabletotheHeartbleedOpenSSLvulnerability(andifitcontinuedtobevulnerableattheendofthestudy).Doingsoallowsustoreasonaboutwhetherthesiteoperatorsshouldhave Figure3:FlowchartofinferenceofpreviousHeartbleedvulnerabilityofhostsbasedonourSSLscan.reissuedtheirSSLcerti\fcate(s)andrevokedtheiroldone(s).DeterminingifahostiscurrentlyvulnerabletoHeartbleedisrelativelyeasy,asonecansimplysendimproperly-formattedSSLheartbeatmessagestotestforvulnerability.However,determiningifasitewasvulnerableatsomepointinthepast|buthassinceupdatedtheirOpenSSLcode|ismorechallenging.WeobservethatonlythreeofthecommonTLSimplementationshaveeversupportedSSLHeartbeats[30]:OpenSSL[24],GnuTLS[33],andBotan[4].Thus,ifahostsupportstheSSLHeartbeatextension,weknowthatitisrunningoneofthesethreeimplementations.Botanisalibrarythatistargetedforclient-sideTLS,andweknowofnopopularwebserverthatisabletousetheBotanTLSlibrary.GnuTLShassupportfortheSSLHeartbeatextension,butitisnotenabledbydefault.TodetermineifthehostisusingGnuTLS,weobservedthatGnuTLSsup-portstheMaxFragmentLengthSSLextension[1],whichisenabledbydefault,whileOpenSSLhasneversupportedthisextension.Thus,ifweobserveahostthatsupportstheSSLHeartbeatextensionbutnottheMaxFragmentLengthex-tension,wedeclarethathosttohavebeenrunningaversionofOpenSSLthatwasvulnerable(seeFigure3foragraphicalrepresentation).TocollectthelistofsitesthatwereevervulnerabletoHeartbleed,we\frstextractedthesetofIPaddressesintheApril28,2014Rapid7scanthatwereadvertisingacerti\f-catewithaCommonNameintheAlexaTop-1Mlist.Wefound5,951,763uniqueIPaddressesinthisset.WethenconnectedtotheseIPaddresses,performedtheTLSnego-tiation,determinedtheSSLextensionsthatthehostsup-ported,anddeterminedwhetherthehostwasstillvulner-abletotheHeartbleedvulnerability.WealsodownloadedthesetofCAcerti\fcatesthatthehostadvertised,whichweusedtoaidcerti\fcatevalidation(see3.2).Limitations.Ourmethodologyforinferringahost'svul-nerabilitytoHeartbleedhasthefollowinglimitations.Be-causewedidourscanthreeweeksafterHeartbleedwasan-nounced,wemayhavebothfalsepositivesandfalseneg-ativesindetectingwhetherahostwasevervulnerabletoHeartbleed.Forfalsepositives,hoststhatwereupgradeddirectlyfromOpenSSL0.9.8toOpenSSL1.0.1g(i.e.,by-passingtheHeartbleedbug)wouldbeincorrectly\raggedasbeingvulnerableinthepast.Wesuspectthisfractionissmall,asthiswouldhavehadtohavehappenedbetweenApril7th(thereleaseofOpenSSL1.0.1g)andApril28th(ourscan),butweareunabletoestimatethefractionofhoststhiscovers.Forfalsenegatives,administratorswhorespondedtoHeartbleedbyeitherrecompilingOpenSSLwith Infact,inourscan,wedidnotdiscoveranyhoststhatwererunningGnuTLSwithSSLHeartbeatsenabled. 493 Figure1:Work\rowfromrawscansoftheIPv4addressspacetovalidcerti\fcates(andcorrespondingCRLs)fromtheAlexaTop-1Mdomains.TheRapid7dataafterFebruary5,2014didnotincludetheintermediate(CA)certi\fcates,necessitatingadditionalstepsanddatatoperformvalidation.Thescansfoundanaverageof26.9millionhostsrespond-ingtoSSLhandshakesonport443(anaverageof9.12%oftheentireIPv4addressspace).Acrossallofthescans,weobservedatotalof19,438,865uniquecerti\fcates(in-cludingallleafandCAcerti\fcates).Inthesectionsbelow,wedescribehowwe\flteredandvalidatedthisdataset;anoverviewoftheprocessisprovidedinFigure1.3.2FilteringDataTofocusonwebdestinationsthatarecommonlyaccessedbyusers,weusetheAlexaTop-1Mdomains[2]asobservedonApril28,2014.We\frstextractallleaf(non-CA)cer-ti\fcatesthatadvertiseaCommonName(CN)thatisinoneofthedomainsintheAlexalist(e.g.,wewouldincludecerti\fcatesforfacebook.comwww.facebook.com,aswellas*.dev.facebook.com).Thissetrepresents1,573,332certi\f-cates(8.1%ofallcerti\fcates).Inordertoremoveinvalidandself-signedcerti\fcatesfromthislist,wethenextractalladvertisedchainsforthesecerti\fcates(whichareonlypresentinthescansthroughFebruary5,2014).Reconstructingchains.Thelackoffullcerti\fcatechainsforthepost-February5,2014scans(see3.1)presentsachallengeatthispoint,asweneedthefullcerti\fcatechainsinordertoproperlyvalidatetheleafcerti\fcates.Toverifynewcerti\fcatesobservedintheselaterscans,weconstructalistofall4,509intermediate(CA),non-self-signedcerti\f-catesobservedinpreviousscans.Fromthesecerti\fcates,weusetwotypesofX.509\feldstohelpwithchainrecon-struction[6]:TheSubjectKeyIdenti\ferandAuthorityKeyIden-ti\feraretwo\feldsincludedinmostcerti\fcates,anduniquelyidentifythepublickeythecerti\fcaterepre-sents(SubjectKeyIdenti\fer)andthepublickeythatsignedthiscerti\fcate(AuthorityKeyIdenti\fer).Thevalueistypicallyimplementedasahashofthepublickey.TheSubjectNameandIssuerNamearetext\feldsthatrepresentthenameoftheentitythiscerti\fcaterep- Wealsoconductourowncrawl(see3.4)ofhostsadvertis-ingcerti\fcatesintheAlexalist,andincludedall4,445ad-ditionalnon-self-signedCAcerti\fcatesthatwediscoveredinthislistaswell.However,wefoundthatnoneoftheadditionalCAcerti\fcateswerenecessaryforvalidation.resents(SubjectName)andthenameofentitythatsignedthiscerti\fcate(IssuerName).Weconstructadatabaseofallfourofthese\feldsacrossall8,954CAcerti\fcates.Usingthisdatabase,weattempttoreconstructaleafcer-ti\fcate'schainbased\frstonthecerti\fcate'sAuthorityKeyIDand,failingthat,thecerti\fcate'sIssuerName.Inotherwords,givenaleafcerti\fcate,welookforaCAcerti\fcatewhoseSubjectKeyIdenti\feristhesameasourleaf'sAu-thorityKeyIdenti\fer.Shouldwenot\fndone(orshouldtheSubjectKeyIdenti\fernotbepresent),weinsteadlookforaCAcerti\fcatewhoseSubjectNameisthesameasourleaf'sIssuerName.Wethenrecursivelyapplythistechniqueuntilwecannot\fndaparentkey,wehitatrustedrootcerti\fcate,orwehitaself-signedCAcerti\fcate.Shouldwe\fndmul-tipleCAkeysthatmatchatanystage,weincludethemallaspotentialchains.Verifyingchains.Wethenunifyoursetofpotentialchains,consistingofbothhost-advertisedchains(forthedatacollectedthroughFebruary5,2014)andreconstructed-chains(forthedatacollectedpost-February5,2014).Un-fortunately,despitetheleafcerti\fcatehavingaCommonNameintheAlexalist,manyofourchainsmaynotbevalid(e.g.,expiredcerti\fcates,forgedself-signedcerti\fcates,certi\fcatessignedbyaninvalidroot,etc.).Onecommonsourceofinvalidcerti\fcatesishomerouters/DSLmodemsprovidedbyISPs(e.g.,FRITZ!Boxes)orcloud-accessiblestoragedevices(e.g.,WesternDigital'sMyCloud),bothofwhichadvertiseself-signedSSLcerti\fcatesinthefritz.netandwd2go.comdomains.Weremovedtheseinvalidchainsbyrunningopensslver-ifyoneachcerti\fcate(anditscorrespondingchain),andonlykeptthecerti\fcatesthatOpenSSLcouldverify.Be-causethescansoccurredatdierentpointsoftime,weusedthefaketimelibrary[14]tohaveOpenSSLvalidatethecerti\fcateasofthetimeofthescan.Wealsocon\fgureOpenSSLtotrustthesetofrootCAcerti\fcatesincludedbydefaultintheOSX10.9.2rootstore[20];thisincludes222uniquerootcerti\fcates.Aftervalidation,weareleftwith628,692leafcerti\fcates(40.0%ofallcerti\fcatesadvertisingAlexadomainsand3.2%ofallcerti\fcates)fromAlexaTop-1MdomainsthatwereadvertisedbysomeIPaddressandcouldbevalidated;werefertothissetofcerti\fcatesastheLeafSet.Eachofthese 492 newcerti\fcatesforarbitrarysubjects.Insuchanevent,itisimportantthattheownerrevokesthecompromisedcer-ti\fcateasquicklyaspossibletomitigatethesetofusersaectedbythecompromise.Certi\fcateRevocationLists(CRLs)arebyfarthemostcommonmeansofdisseminatingrevocations.CRLsconsistofalistof(serialnumber,timestampofrevocation,reasonforrevocation)triples,allofwhicharecollectivelysignedbytheCA.CAsincludeinthecerti\fcatesthattheyissueaURLpointingtotheCRLthatwouldcontainthatcerti\f-cate'sserialnumber,ifitweretobecomerevoked.ClientsperiodicallydownloadandcacheCRLs,andusethemwhenvalidatingacerti\fcatechain.Ostensiblytoreducethecom-municationoverheadforCAsandforusers,clientstypi-callydownloadCRLsinfrequently(ontheorderofhoursordays),potentiallyleavingmanyuserswithoutdatedin-formationonthevalidityoftheircerti\fcates.Thishasspurredseveralstudiesintomoreecientmeansofrevo-cation[12,21,23,29,36],andgeneraldoubtastotheover-allecacyofrevocations[28].Yet,CRLsremainthedefactomeansofdisseminatingrevocationinformation,andthustheyfactorheavilyinourstudy.2.3CerticateReissuesWhenasiteceasestouseacerti\fcate|forinstancebe-causetheyfoundthatthecerti\fcatehasbeencompromised,orbecausethecerti\fcateexpired|theymustuseanewcer-ti\fcateinstead.Thisprocessisreferredtoasreissuingthecerti\fcate.Todoso,thesystemadministratormustcon-tacttheCAwhosignedtheircerti\fcateandrequestanewsignature;thisistypicallydonebysendingtheCAaCerti\f-cateSigningRequest(CSR).Inthecasewheretheprivatekeymayhavebeencompromised,theadministratorshouldalsochooseanewpublic/privatekeypairtobesigned(asreissuingthecerti\fcatewiththesamekeydoesnothingtomitigatetheleakedprivatekey).Whileitseemsnaturaltoassumethatcerti\fcatesarereis-suedatpreciselythemomenttheoldcerti\fcateisrevoked,infacttoday'sPKIprotocolsmakenosuchrequirement.Asourstudywilldemonstrate,reissuescanhappenbefore,dur-ing,orafterarevocation|orevenwithoutrevokingtheoldcerti\fcateatall.Tothebestofourknowledge,wearethe\frsttocorrelaterevocationswithreissues.2.4HeartbleedHeartbleedisabuerover-readvulnerabilitydiscoveredinOpenSSL[24]thatwaspresentinversions1.0.1(releasedMarch14,2012)through1.0.1f.ThevulnerabilitystemsfromabuginOpenSSL'simplementationoftheTLSHeart-beatExtension[30].TheintendedfunctionalityofTLSHeartbeatistoallowaclienttotestasecurecommuni-cationchannelbysendinga\heartbeat"messageconsistingofastringandthe16-bitpayload_lengthofthisstring.Unfortunately,vulnerableOpenSSLversionsfailtocheckthatthepayload_lengthsuppliedbytheclientmatchesthelengthoftheprovidedstring.Thisallowsamaliciousclienttocraftaheartbeatmessagecontaininga1-bytestringand1asthepayload_length.Inthiscase,OpenSSLwillallocatea64KBblockofheapmemory,memcpy()64KBofdataintoit,startingwiththe1-bytestring,and\fnallysendthecontentsoftheentirebuertotheclient.Ineect,thisallowsthemaliciousclienttoreadupto22bytesoftheserver'sheapmemory.Notethatwhilethemaliciousclientcanchoosetheamountofmemorytoread,ithasnocontroloverthelocationofthememorythatiscopied,andthereforecannotchoosewhichmemorytoread.ByrepeatedlyexploitingHeartbleed,anattackercanextractsensitivedatafromtheserver(e.g.,SSLprivatekeys[32],userdata[13],etc.).TheseverityofHeartbleedisexacerbatedbythefactthatOpenSSLdoesnotlogheart-beatmessages,givingattackersfreereigntoundetectablyexploitHeartbleed.Giventheseverityandundetectablena-tureofmalicioususersexploitingHeartbleed,siteoperatorswereurgedtoimmediatelyupdatetheirOpenSSLsoftwareandrevokeandreissuetheircerti\fcates[5].Timeline.Heartbleedwas\frstdiscoveredbyNeelMehtafromGoogleonMarch21,2014.GoogleimmediatelywroteapatchandappliedittotheirownOpenSSLdeployments.OnApril2,researchersatFinnishsecuritycompanyCode-nomiconindependentlydiscoveredthebuganddubbeditHeartbleed.OnApril4,Akamaipatchedtheirservers.OnApril7,thebugbecamepublicandtheOpenSSLprojectre-leasedapatchedversion(1.0.1g)oftheOpenSSLlibrary[15].WhystudyHeartbleed?Thesigni\fcanceofthistime-line,andofHeartbleedingeneral,isthatitrepresentsapointintimeafterwhichallvulnerableserversshouldhavetakenthreecriticalstepstoensurethesecurityoftheirser-viceandtheirusers:theyshouldhavepatchedtheircode,revokedtheiroldcerti\fcate,andreissuedanewone.Asaresult,Heartbleedactsasasortofnaturalexperiment,al-lowingustomeasurehowcompletelyandquicklyadminis-tratorstookstepstosecuretheirkeys.Whilesucheventsare(sadly)notterriblyuncommonforgeneralsecurityvulnera-bilities[25,27,35],itremainsrarethatsuchalargefractionofthecerti\fcateecosystemmustreissueandrevoketheirSSLcerti\fcates.3.DATAANDMETHODOLOGYWenowdescribethedatasetsthatwecollectedandourmethodologyfordeterminingahost'sSSLcerti\fcate,whenitwasinuse,ifandwhenthecerti\fcatewasrevoked,andifthehostwas(orisstill)vulnerabletotheHeartbleedbug.3.1CerticateDataSourceWeobtainourcollectionofSSLcerti\fcatesfrom(roughly)weeklyscansoftheentireIPv4addressspacemadeavailablebyRapid7[26].Inthispaper,weusescanscollectedbetweenOctober30,2013andApril28,2014.Thereareatotalof28scansduringthisperiod,givinganaverageof6.7days(withaminimumof3daysandmaximumof9days)betweensuccessivescans.Thescandataincludesallcerti\fcatesadvertisedbyeachhost(includingintermediateandrootcerti\fcates)inthescansupthroughFebruary5,2014,andincludesonlythe\frstadvertisedcerti\fcatebyeachhostinthelaterscans.Forexample,supposethatahostisadvertisingachainofthreecerti\fcates:acerti\fcateforexample.com,acerti\fcateforGeoTrust,andself-signedrootcerti\fcate,whereeachcerti\fcatesignstheprevious.Theearlierscanswouldin-cludeallthreecerti\fcates,whereasthelaterscanswouldincludeonlythecerti\fcateforexample.com.Thelackoffullcerti\fcatechainsinthelaterscanspresentschallengesforvalidation,whichweaddressin3.2. 491 serversthatweresusceptibletoHeartbleedshouldhaveop-eratedundertheassumptionthananattackerhadalreadyobtainedtheirprivatekeys,andthereforeshouldhavere-vokedtheircerti\fcatesandreissuednewones[5],ideallyassoonasthevulnerabilitywaspubliclyannounced.Thescopeofthisvulnerability|itisestimatedthatupto17%ofallHTTPSwebserverswerevulnerable[22]|makesitanidealcasestudyforevaluatinglarge-scalepropertiesofSSLsecurityinthefaceofprivatekeycompromise.Whilepreviousstudieshavemeasuredhowquicklyandthoroughlyadministratorspatchsoftwarevulnerabilities[25,27,35],weare,tothebestofourknowledge,the\frsttostudyadmin-istrationofcerti\fcatesinthewakeofavulnerability.Inparticular,thispaperfocusesoncerti\fcaterevocationandreissuesinresponsetothepublicannouncementofHeart-bleed,bothintermsofhowquicklycerti\fcatesarereissuedandwhetherornotthecerti\fcatesareeventuallyrevoked.Towardthisgoal,wemakethefollowingkeycontributions.First,weconductalarge-scalemeasurementstudyofSSLcerti\fcatesinthewildusingbothdatacollectedfrompublicarchivesandthroughcustommeasurementsconductedaf-terHeartbleedwaspublicized.WefocusontheAlexaTop1Million(Top-1M)domains,forwhichwe\fndatotalof628,692validSSLcerti\fcatesfrom166,124uniquedomains.Second,weconductmeasurementstodeterminewhichserversremainvulnerabletoHeartbleedandwhichoneswerepreviouslyvulnerablebutarenowpatched.Wede-velopanewSSLimplementation\fngerprintingtechniquethatisabletodetermineifahostisrunningaversionofOpenSSLthatwasvulnerableinthepast.Wecross-validatewithdirectmeasurementsofthevulnerability(we\fndourtechniquehasafalsepositiverateofonly1.9%)andcon-ductscanstocomposealistofpreviouslyvulnerablehosts.We\fndthatthemostpopularwebsitesweremorelikelytohaveatleastonehostvulnerabletoHeartbleed,likelybecausetheyoftenhavemorehosts.Third,wedevelopnovelheuristicstoidentifywhichcer-ti\fcateshavebeenreissuedindirectresponsetoHeartbleed,asopposedtootherreasonssuchascerti\fcateexpirationorperiodicreissues.Thisallowsustounderstandhowad-ministratorsdo(ordonot)reacttopotentialprivatekeycompromise.WeobservethatwhilevulnerablesiteswithahigherAlexarankweremorelikelytoreissuetheircer-ti\fcates,thevastmajority(73.3%)ofvulnerablecerti\fcateshadnotbeenreissuedfullythreeweeksafterthevulnerabil-itywasannounced.Thesevulnerablecerti\fcatescomefrommorethan55,000uniquedomains.Fourth,weanalyzecerti\fcaterevocationbehaviorovertimeandacrosscerti\fcateowners.We\fndasharp(upto40-fold)increaseinrevocationsperdayaftertheHeart-bleedannouncement,butforthemajority(60%)ofreissuedcerti\fcates,theprevious(vulnerable)certi\fcatewasnotre-voked.ForthosethatarerevokedduetoHeartbleed,we\fndmorerevocationsincerti\fcaterevocationlists(CRLs)tohaveexplanations(reasoncodes)thanrevocationsun-relatedtoHeartbleed,andtheyappearintheCRLsmorequicklythanrevocationsnotduetoHeartbleed.Further,weexaminetheupdatefrequencyofCRLstodetermineifCerti\fcateAuthorities(CAs),theentitiesthatissuecerti\f-cates,serveasa\bottleneck"forrevocations(asitistheCAwhomaintainstheCRL).We\fndthatCRLsappeartobeupdatedfrequently,withover95%ofthembeingupdatedwithintheprevious24-hourperiod.Theremainderofthispaperisorganizedasfollows.Inthenextsection,weprovidebackgroundaboutSSL/TLS,PKIs,andtheHeartbleedvulnerability.In3wedescribeourdatasetandmethodologyforextractingvalidcerti\f-catesanddeterminingHeartbleedvulnerabilityatservers.4presentstheresultsofouranalysis,whereweidentifythebehaviorofcerti\fcatereissuingandrevocationonalargedatasetofAlexa'sTop-1Mwebsites.Wesummarizerelatedworkin5andconcludein6.2.BACKGROUNDSecureSocketsLayer(SSL)andTransportLayerSecurity(TLS)oerapplication-layercon\fdentialityandintegrity,andarethebasisofthevastmajorityofsecureonlinecom-munication.Throughtheuseofapublickeyinfrastructure(PKI),theseprotocolsalsoallowclientstoauthenticatetheserverswithwhomtheycommunicate.Inthissection,weprovideabriefbackgroundofSSL/TLSandPKIsrelevanttoourstudy,anddescribetherecentHeartbleedvulnerability.2.1CerticatesAcerti\fcateis,atitscore,asignedattestationbindingsubjecttoapublickey.Certi\fcatesaresignedbyaCer-ti\fcateAuthority(CA),whointurnhasitsowncerti\fcate,andsoon,terminatingatself-signedrootcerti\fcates.Thereisalogicalchainofcerti\fcates|leadingfromarootcerti\f-catethroughzeroormoreintermediatecerti\fcates,toaleafcerti\fcate|whereinthecerti\fcateatlevelissignedwiththeprivatekeycorrespondingtothecerti\fcateatlevelwiththeexceptionoftheself-signedcerti\fcateattheroot.Inpractice,thetopologyofcerti\fcatescanbesomewhatcomplex,withCAssigningoneanother'scerti\fcates[17],butsuchdetailsarenotpertinenttothestudyperformedinthispaper.Whenaclientvisitsasitethatsupports,say,HTTPS,thatsitesendsitscerti\fcatechaintotheclient,whoveri\festhesignaturesfromleaftoroot.Iftheclientcansuccess-fullyvalidateeachsignature,andiftheclienttruststherootcerti\fcate|forinstancebycheckingitagainstasetofcerti\f-catespre-installedinthebrowseroroperatingsystem|thentheclientinfersthatthesubjectintheleafcerti\fcatetrulyistheownerofthepublickey.Thepredominantformatofcerti\fcatesisX.509[6],whichincludesconsiderablymoreinformationthanjustsubjectandpublickey,includingaunique(forthatCA)serialnum-ber,anexpirationdate,thekey'sciphersuite,acceptableusesofthekey,andinformationonhowtocheckwhetherthecerti\fcatehasbeenrevoked2.2CerticateRevocationInadditiontoissuingcerti\fcates,CAsarealsoresponsi-bleformakingavailablealistofcerti\fcatesithasissuedthathavebeenrevoked,afterwhichclientsshouldnolongerconsiderthosecerti\fcatesvalid.Notethat,ifaCA's(in-termediateorroot)certi\fcateisrevoked,allleafcerti\fcatessignedbythatCAwillfailtovalidate.Therearemanyreasonsasitecandecidetorevokeacer-ti\fcate.Onecriticallyimportantexampleisthatofacom-promisedcerti\fcate.Acerti\fcateiscompromisedifsomeoneotherthanitsoriginalownerlearnsthecorrespondingpri-vatekey,allowingthatpersontogeneratesignaturesandthusimpersonatetheowner.InthecaseofaCAcerti\fcate,releaseoftheprivatekeymayallowanattackertogenerate 490 AnalysisofSSLCerticateReissuesandRevocationsintheWakeofHeartbleedLiangZhangDavidChoffnesDaveLevinTudorDumitra¸sNortheasternUniversityNortheasternUniversityUniversityofMarylandUniversityofMarylandliang@ccs.neu.educhoffnes@ccs.neu.edudml@cs.umd.edutdumitra@umiacs.umd.eduAlanMisloveAaronSchulmanChristoWilsonNortheasternUniversityStanfordUniversityNortheasternUniversityamislove@ccs.neu.eduaschulm@stanford.educbw@ccs.neu.eduABSTRACTCentraltothesecureoperationofapublickeyinfrastruc-ture(PKI)istheabilitytorevokecerti\fcates.Whilemuchofusers'securityrestsonthisprocesstakingplacequickly,inpractice,revocationtypicallyrequiresahumantodecidetoreissueanewcerti\fcateandrevoketheoldone.Thus,havingaproperunderstandingofhowoftensystemsadmin-istratorsreissueandrevokecerti\fcatesiscrucialtounder-standingtheintegrityofaPKI.Unfortunately,thisistypi-callydiculttomeasure:whileitisrelativelyeasytodeter-minewhenacerti\fcateisrevoked,itisdiculttodeterminewhetherandwhenanadministratorshouldhaverevoked.Inthispaper,weusearecentwidespreadsecurityvul-nerabilityasanaturalexperiment.PubliclyannouncedinApril2014,theHeartbleedOpenSSLbug,potentially(andundetectably)revealedservers'privatekeys.AdministratorsofserversthatweresusceptibletoHeartbleedshouldhaverevokedtheircerti\fcatesandreissuednewones,ideallyassoonasthevulnerabilitywaspubliclyannounced.Usingasetofallcerti\fcatesadvertisedbytheAlexaTop1Milliondomainsoveraperiodofsixmonths,weexplorethepatternsofreissuingandrevokingcerti\fcatesinthewakeofHeartbleed.We\fndthatover73%ofvulnerablecerti\fcateshadyettobereissuedandover87%hadyettoberevokedthreeweeksafterHeartbleedwasdisclosed.Moreover,ourresultsshowadrasticdeclineinrevocationsontheweekends,evenimmediatelyfollowingtheHeartbleedannouncement.Theseresultsareanimportantstepinunderstandingthemanualprocessesonwhichusersrelyforsecure,authenti-catedcommunication.Permissiontomakedigitalorhardcopiesofallorpartofthisworkforpersonalorclassroomuseisgrantedwithoutfeeprovidedthatcopiesarenotmadeordistributedforprotorcommercialadvantageandthatcopiesbearthisnoticeandthefullcitationontherstpage.Copyrightsforcomponentsofthisworkownedbyothersthantheauthor(s)mustbehonored.Abstractingwithcreditispermitted.Tocopyotherwise,orrepublish,topostonserversortoredistributetolists,requirespriorspecicpermissionand/orafee.Requestpermissionsfrompermissions@acm.org.November57,2014,Vancouver,BC,Canada.Copyrightisheldbytheowner/author(s).PublicationrightslicensedtoACM.ACM978-1-4503-3213-2/14/11...$15.00.http://dx.doi.org/10.1145/2663716.2663758.CategoriesandSubjectDescriptorsC.2.2[Computer-CommunicationNetworks]:Net-workProtocols;C.2.3[Computer-CommunicationNet-works]:NetworkOperations;E.3[DataEncryption]:PublicKeyCryptosystems,StandardsKeywordsHeartbleed;SSL;TLS;HTTPS;X.509;Certi\fcates;Reissue;Revocation;Extendedvalidation1.INTRODUCTIONSecureSocketsLayer(SSL)andTransportLayerSecu-rity(TLS)arethede-factostandardsforsecuringInternettransactionssuchasbanking,e-mailande-commerce.Alongwithapublickeyinfrastructure(PKI),SSLprovidestrustedidentitiesviacerti\fcatechainsandprivatecommunicationviaencryption.CentraltotheseguaranteesisthatprivatekeysusedinSSLarenotcompromisedbythirdparties;ifso,certi\fcatesbasedonthoseprivatekeysmustbereissuedandrevokedtoensurethatmaliciousthirdpartiescannotmasqueradeasatrustedentity.Importantly,thePKIusesadefault-validmodelwherepotentiallycompromisedcerti\fcatesremainvaliduntiltheirexpirationdateoruntiltheyarerevoked.Revocation,how-ever,isaprocessthatrequiresmanualinterventionfromcer-ti\fcateownersandcooperationfromclientsthatusethesecerti\fcates.Asaresult,thepracticalsecurityofthePKIisdependentonthespeedwithwhichcerti\fcateownersandSSLclientsupdatetheirrevocationlists,operationsthatoc-curathumantimescales(hoursordays)insteadofcomputerones(secondsorminutes).Animportantopenquestionis:whenprivatekeysarecompromised,howlongareSSLclientsexposedtopotentialattacks?Inthispaper,weaddressthisquestionusingare-centwidespreadsecurityvulnerabilityasanaturalexper-iment.Inmid-April2014,anOpenSSLsecurityvulnera-bility,Heartbleed,madeitpossibleforattackerstoinspectservers'memorycontents,therebypotentially(andunde-tectably)revealingservers'privatekeys.Administratorsof TLSisthesuccessorofSSL,butbothusethesameX.509certi\fcates.Throughoutthepaper,wereferto\SSLclients"and\SSLcerti\fcates,"butour\fndingsapplyequallytoserversusingbothprotocols. 489